Using Proven Reference Monitor Patterns for Security Evaluation

The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable. Just such an integrated set of security patterns was created decades ago based on the Reference Monitor abstraction...

Full description

Bibliographic Details
Main Authors: Mark R. Heckman, Roger R. Schell
Format: Article
Language:English
Published: MDPI AG 2016-04-01
Series:Information
Subjects:
TNI
Online Access:http://www.mdpi.com/2078-2489/7/2/23