icon-carat-right menu search cmu-wordmark

Technology Foundations for Computational Evaluation of Software Security Attributes

Technical Report
In this 2006 report, the authors describe foundations for computational security attributes technology.
Publisher

Software Engineering Institute

CMU/SEI Report Number
CMU/SEI-2006-TR-021
DOI (Digital Object Identifier)
10.1184/R1/6584849.v1

Abstract

In the current state of practice, analysis of the security attributes of software systems is typically carried out through subjective evaluations by security experts who accumulate system knowledge in bits and pieces from architectures, specifications, designs, code, and tests. In contrast, this report describes foundations for a new computational security attributes (CSA) technology. This innovative approach provides precise computational methods for defining and analyzing security attributes based solely on the data and transformations of data found within programs. CSA permits security attributes to be evaluated through automatable analysis of the functional behavior of programs. The technology can support specification of security attributes of systems before they are built; specification and evaluation of security attributes of acquired software; verification of the as-built security attributes of systems; and real-time evaluation of security attributes during system operation.

Cite This Technical Report

Walton, G., Longstaff, T., & Linger, R. (2006, December 1). Technology Foundations for Computational Evaluation of Software Security Attributes. (Technical Report CMU/SEI-2006-TR-021). Retrieved December 22, 2024, from https://doi.org/10.1184/R1/6584849.v1.

@techreport{walton_2006,
author={Walton, Gwendolyn and Longstaff, Thomas and Linger, Richard},
title={Technology Foundations for Computational Evaluation of Software Security Attributes},
month={{Dec},
year={{2006},
number={{CMU/SEI-2006-TR-021},
howpublished={Carnegie Mellon University, Software Engineering Institute's Digital Library},
url={https://doi.org/10.1184/R1/6584849.v1},
note={Accessed: 2024-Dec-22}
}

Walton, Gwendolyn, Thomas Longstaff, and Richard Linger. "Technology Foundations for Computational Evaluation of Software Security Attributes." (CMU/SEI-2006-TR-021). Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, December 1, 2006. https://doi.org/10.1184/R1/6584849.v1.

G. Walton, T. Longstaff, and R. Linger, "Technology Foundations for Computational Evaluation of Software Security Attributes," Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, Technical Report CMU/SEI-2006-TR-021, 1-Dec-2006 [Online]. Available: https://doi.org/10.1184/R1/6584849.v1. [Accessed: 22-Dec-2024].

Walton, Gwendolyn, Thomas Longstaff, and Richard Linger. "Technology Foundations for Computational Evaluation of Software Security Attributes." (Technical Report CMU/SEI-2006-TR-021). Carnegie Mellon University, Software Engineering Institute's Digital Library, Software Engineering Institute, 1 Dec. 2006. https://doi.org/10.1184/R1/6584849.v1. Accessed 22 Dec. 2024.

Walton, Gwendolyn; Longstaff, Thomas; & Linger, Richard. Technology Foundations for Computational Evaluation of Software Security Attributes. CMU/SEI-2006-TR-021. Software Engineering Institute. 2006. https://doi.org/10.1184/R1/6584849.v1