Issue No. 01 - January/February (2011 vol. 9)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2011.10
Cynthia Irvine , Naval Postgraduate School
J.R. Rao , IBM Thomas J. Watson Research Center
Construction of highly trustworthy systems is quite challengiwng and requires experienced leaders who can guide development teams through technical, political, and bureaucratic hurdles. Today's systems must be designed so that their security claims remain valid from inception through retirement. Hence, security engineering must start at the earliest stages of development, when wise choices can have a major impact on system trustworthiness and vulnerabilities are relatively inexpensive to fix. This guest editors' introduction notes the apparent scarcity of large projects incorporating rigorous security engineering and enumerates topics for further investigation, such as compositionality, formal modeling and verification, RAS and resiliency, economic factors, user acceptability and usability, and extensibility.
Secure Engineering, Trustworthy, High Assurance, Common Criteria, Root of Trust, TPM, Compositionality, Engineering Secure Systems
Cynthia Irvine, J.R. Rao, "Guest Editors' Introduction: Engineering Secure Systems", IEEE Security & Privacy, vol. 9, no. , pp. 18-21, January/February 2011, doi:10.1109/MSP.2011.10