CHAPTER 77
THE FUTURE OF INFORMATION ASSURANCE1
Peter G. Neumann
77.3.3 Pervasively Integrated Assurance
77.3.4 Analysis of Requirements
77.3.5 Analysis of Compositions
77.3.6 Analysis of Property Transformations
77.3.7 Analysis of Dependencies
77.3.8 Detecting and Eliminating Vulnerabilities
77.3.9 Software and Hardware Consistency Analysis
77.3.10 System-Oriented Analyses
77.3.13 Risk Analysis and Risk Abatement
77.3.14 System Evaluation and Certification
77.4 BEST PRACTICES FOR INCREASING ASSURANCE
77.5 ASSURANCE-BASED RISK REDUCTION
77.5.3 Reliability, Availability, and Survivability
77.6 ILLUSTRATIVE APPLICATION: COMPUTER-AIDED VOTING
77.6.2 Voting-Related Requirements
77.1 INTRODUCTION
Assurance is in the eye of the beholder.
Although this chapter is at the end of the Handbook, we are still only at the beginning of the quest for meaningfully trustworthy systems. We begin by asserting that there are no easy answers, although some potentially worthy approaches are outlined here. Nevertheless, the reader must bear in mind that the problems of obtaining trustworthy systems are inherently complex, and thus it is important to approach this complexity ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.