The Community for Technology Leaders
Green Image
Issue No. 01 - January/February (2011 vol. 9)
ISSN: 1540-7993
pp: 18-21
Cynthia Irvine , Naval Postgraduate School
J.R. Rao , IBM Thomas J. Watson Research Center
ABSTRACT
Construction of highly trustworthy systems is quite challengiwng and requires experienced leaders who can guide development teams through technical, political, and bureaucratic hurdles. Today's systems must be designed so that their security claims remain valid from inception through retirement. Hence, security engineering must start at the earliest stages of development, when wise choices can have a major impact on system trustworthiness and vulnerabilities are relatively inexpensive to fix. This guest editors' introduction notes the apparent scarcity of large projects incorporating rigorous security engineering and enumerates topics for further investigation, such as compositionality, formal modeling and verification, RAS and resiliency, economic factors, user acceptability and usability, and extensibility.
INDEX TERMS
Secure Engineering, Trustworthy, High Assurance, Common Criteria, Root of Trust, TPM, Compositionality, Engineering Secure Systems
CITATION
Cynthia Irvine, J.R. Rao, "Guest Editors' Introduction: Engineering Secure Systems", IEEE Security & Privacy, vol. 9, no. , pp. 18-21, January/February 2011, doi:10.1109/MSP.2011.10
96 ms
(Ver 3.1 (10032016))