Abstract
In October 1986, the Centre for Software Reliability sponsored a symposium on Safety and Security. Held in Glasgow, the aim of this symposium was to explore the proposition that safety and security were duals and that there would be much to be gained by the one adopting the knowledge, understanding, tools and techniques of the other, and vice versa. The symposium [Anderson 89] concluded that “the differences between the topics of Reliability, Safety and Security are more than sheer semantics” but that “there are many similarities which we would be wise to explore”.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson T: “Safe and Secure Computing Systems.” Blackwell Scientific Publications, London, 1989.
Anderson J P: “Computer Security Technology Planning Study.” ESD-TR-73–51, vol I, AD-758 206, ESD/AFSC, Hanscom AFB, Bedford, Mass., October 1972.
Bell D E and LaPadula L J: “Secure Computer Systems: Unified Exposition and Multics Interpretation.” ESD-TR-75–306 MTR 2997 Rev 1, The MITRE Corporation, USA, March 1976.
Bell D E: “Putting Policy Commonalities to Work.” Proceedings of the 14th National Computer Security Conference, NIST/NCSC, USA, 1991 pp 456–471.
Brewer D F C and Nash M J: “The Chinese Wall Security Policy.” Proceeding of the IEEE Symposium on Security and Privacy, 1989 pp 206–214.
Commission of European Communities: “Information Technology Security Evaluation Criteria - Provisional Harmonised Criteria.” Commission of European Communities, Luxembourg, June 1991.
Commission of European Communities: “Information Technology Security Evaluation Manual.” V 0. 2, Commission of European Communities, Luxembourg, March 1992.
Clark D and Wilson D R: “A Comparison of Commercial and Military Computer Security Policies.” Proceedings of the 1987 IEEE Symposium on Research in Security and Privacy, 1987 pp 184–194.
US Department of Defense: “Trusted Computer System Evaluation Criteria.” DOD 5200.28-STD, Department of Defense, USA, December 1985.
DOD 85131 US Department of Defense: “Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments.’ CSC-STD-003–85, Department of Defense, USA, June 1985.
Ministry of Defence: “Interim Defence Standard 00–55/Issue 1 - The Procurement of Safety Critical Software in Defence Equipment.’ MOD, April 1991.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1993 Springer-Verlag London Limited
About this paper
Cite this paper
Brewer, D.F.C. (1993). Applying Security Techniques to Achieving Safety. In: Redmill, F., Anderson, T. (eds) Directions in Safety-Critical Systems. Springer, London. https://doi.org/10.1007/978-1-4471-2037-7_16
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2037-7_16
Publisher Name: Springer, London
Print ISBN: 978-3-540-19817-8
Online ISBN: 978-1-4471-2037-7
eBook Packages: Springer Book Archive