A method for designing secure solutions

  • Authors:
  • J. J. Whitmore

  • Affiliations:
  • IBM Corporation, 5267 East Simpson Ferry Road, Mechanicsburg, Pennsylvania

  • Venue:
  • IBM Systems Journal - End-to-end security
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

The task of developing information technology (IT) solutions that consistently and effectively apply security principles has many challenges, including: the complexity of integrating the specified security functions within the several underlying component architectures found in computing systems, the difficulty in developing a comprehensive set of baseline requirements for security, and a lack of widely accepted security design methods. With the formalization of security evaluation criteria into an international standard known as Common Criteria, one of the barriers to a common approach for developing extensible IT security architectures has been lowered; however, more work remains. This paper describes a systematic approach for defining, modeling, and documenting security functions within a structured design process in order to facilitate greater trust in the operation of resulting IT solutions.