Abstract
In this talk I will discuss our experience with one particular development methodology for security related software. I will describe the general principles it follows, the tools used, and the resources needed. Then I will offer some opinions on why this approach is effective and practical for achieving even moderate levels of security. When the goal is a very high level security, I will explain why I believe that at least the general principles, if not the specific details, are probably essential.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barnes, J.: High Integrity Software: The SPARK Approach to Safety and Security. Addison Wesley, Reading, ISBN 0-321-13616-0
Barnes, J., Chapman, R., Cooper, D., Everett, B., Johnson, R., Widmaier, J.: Engineering the Tokeneer Enclave Protection Software. In: Redwine, S., Hall, A., Wing, J. (eds.) IEEE International Symposium on Secure Software Engineering, March 13-15. IEEE Computer Society, Los Alamitos (2006)
Spivey, J.M.: The Z Notation: a reference manual, 2nd edn., http://spivey.oriel.ox.ac.uk/mike/zrm/index.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Johnson, D.R. (2006). Cost Effective Software Engineering for Security. In: Misra, J., Nipkow, T., Sekerinski, E. (eds) FM 2006: Formal Methods. FM 2006. Lecture Notes in Computer Science, vol 4085. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11813040_43
Download citation
DOI: https://doi.org/10.1007/11813040_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37215-8
Online ISBN: 978-3-540-37216-5
eBook Packages: Computer ScienceComputer Science (R0)