Skip to main content

Applying Security Techniques to Achieving Safety

  • Conference paper
Directions in Safety-Critical Systems

Abstract

In October 1986, the Centre for Software Reliability sponsored a symposium on Safety and Security. Held in Glasgow, the aim of this symposium was to explore the proposition that safety and security were duals and that there would be much to be gained by the one adopting the knowledge, understanding, tools and techniques of the other, and vice versa. The symposium [Anderson 89] concluded that “the differences between the topics of Reliability, Safety and Security are more than sheer semantics” but that “there are many similarities which we would be wise to explore”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson T: “Safe and Secure Computing Systems.” Blackwell Scientific Publications, London, 1989.

    Google Scholar 

  2. Anderson J P: “Computer Security Technology Planning Study.” ESD-TR-73–51, vol I, AD-758 206, ESD/AFSC, Hanscom AFB, Bedford, Mass., October 1972.

    Google Scholar 

  3. Bell D E and LaPadula L J: “Secure Computer Systems: Unified Exposition and Multics Interpretation.” ESD-TR-75–306 MTR 2997 Rev 1, The MITRE Corporation, USA, March 1976.

    Google Scholar 

  4. Bell D E: “Putting Policy Commonalities to Work.” Proceedings of the 14th National Computer Security Conference, NIST/NCSC, USA, 1991 pp 456–471.

    Google Scholar 

  5. Brewer D F C and Nash M J: “The Chinese Wall Security Policy.” Proceeding of the IEEE Symposium on Security and Privacy, 1989 pp 206–214.

    Google Scholar 

  6. Commission of European Communities: “Information Technology Security Evaluation Criteria - Provisional Harmonised Criteria.” Commission of European Communities, Luxembourg, June 1991.

    Google Scholar 

  7. Commission of European Communities: “Information Technology Security Evaluation Manual.” V 0. 2, Commission of European Communities, Luxembourg, March 1992.

    Google Scholar 

  8. Clark D and Wilson D R: “A Comparison of Commercial and Military Computer Security Policies.” Proceedings of the 1987 IEEE Symposium on Research in Security and Privacy, 1987 pp 184–194.

    Google Scholar 

  9. US Department of Defense: “Trusted Computer System Evaluation Criteria.” DOD 5200.28-STD, Department of Defense, USA, December 1985.

    Google Scholar 

  10. DOD 85131 US Department of Defense: “Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments.’ CSC-STD-003–85, Department of Defense, USA, June 1985.

    Google Scholar 

  11. Ministry of Defence: “Interim Defence Standard 00–55/Issue 1 - The Procurement of Safety Critical Software in Defence Equipment.’ MOD, April 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag London Limited

About this paper

Cite this paper

Brewer, D.F.C. (1993). Applying Security Techniques to Achieving Safety. In: Redmill, F., Anderson, T. (eds) Directions in Safety-Critical Systems. Springer, London. https://doi.org/10.1007/978-1-4471-2037-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2037-7_16

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19817-8

  • Online ISBN: 978-1-4471-2037-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics