Striving for correctness

نویسندگان

  • Marshall D. Abrams
  • Marvin V. Zelkowitz
چکیده

ion layers, conceptually illustrated in Table 1. The security engineer must understand that the device designer, circuit designer, and operating system architect have different viewpoints. Each specialist assumes that the interface provided to him or her by the underlying layer is primitive and trustworthy. This trust is a consequence of specialization. Engineers working at one technological level of abstraction are usually not prepared to investigate and determine the trustworthiness of the resources with which they work. For example, software experts rarely know about hardware design. However, they tend to view hardware as a monolithic entity and to trust it. This trust may or may not be warranted. The hardware may be failure prone due to errors in design or fabrication, the assumptions upon which the hardware is being used may be false, or it may also have been built with malicious intent to sustain the same kinds of attacks as are commonly implemented in software, such as viruses and Trojan horses. See [2] for further discussion. Similarly, software experts who build trusted computing bases or communications protocol interpreters are users of supporting software, such as compilers and editors. They assume that this supporting software is trustworthy. While this is usually the case, Thompson [3] eloquently advises that one should be careful about extending trust. Recent work has described critical issues related to software trust and has proposed a set of criteria classes for measuring and comparing trust [4]. Addressing the trustworthiness of these layers is a matter of risk management. Absolute risk avoidance would address every possible level of risk. Risks might exist in the design of the chips, the TABLE 1. Abstraction layers Applications Security subsystem Operating system Compilers, loaders, etc. Circuit design and fabrication Semiconductor chip design side-effects of instruction set design (especially unimplemented instructions in complex instruction set architectures), or the security flaws in all supporting software. It has been common when confidentiality was the only security policy to assume that mass-produced bedrock was a sufficiently low risk that it could be ignored. Consideration of integrity and availability as security policies may justiftreconsideration. 1.3 The gods have clay feet-the emperor is naked This paper tends to proclaim that the gods have clay feet or that the emperor is naked. These are never popular sentiments. They are presented as constructively as possible, but we humbly acknowledge that we have no completely satisfactory answer. Our overall challenge to the community is the traditional engineer’s problem of finding cost-effective ways of applying the knowledge and skill base to the solution of social problems and requirements. This paper looks at the practical application of research results and finds a lack of evidence to support the very strong beliefs in the efficacy of various methods for increasing IT security. 1.4 Assurance, effectiveness and correctness Assurance is defined3 as “the confidence that may be held in the security provided by a target of evaluation.” Informally, assurance is a “warm fuzzy feeling” that the system can be relied upon to reduce residual risk to the predetermined level. Without delving into psychology, we observe that effectiveness and correctness both contribute to assurance. Efictiveness is determined by analysis of the functional requirements; the environment in which the system will be used, the risks, threats, and vulnerabilities; and all the countermeasures, including physical, administrative, procedural, personnel, and technical. The system is considered effective if the result of this analysis is an acceptable residual risk. Correctness is determined by ‘Definitions of assurance, correctness, and effectiveness are taken from the Information Technology Security Evaluation Criteria (ITSEC) (51. Better definitions may be available by the time this paper is published.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Mediating Role of Mental Health and Emotional Intelligence in Personal Growth Initiative and Achievement Striving Behavior of Political Office Holders in South-West, Nigeria

Political office holders are chiefly entrusted with the formulation and implementation of government policies and programmes designed to enhance sustainable development. Their activities can therefore make or unmake a nation, geo-political region initiative. The mental health and emotional intelligence of political office holders had been linked with their personal growth initiative and a...

متن کامل

A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...

متن کامل

Inquiry into Scientific Correctness of the Elementary School Farsi Textbooks

Inquiry into Scientific Correctness of the Elementary School Farsi Textbooks   H. Ghamari, Ph.D.*   Scientific validity or correctness is of paramount importance when it comes to the contents of textbooks used in elementary schools, as the very foundations of learners’ knowledge is constructed therein. Hence, an analysis of these contents from this perspective is necessary in order to guide...

متن کامل

Development of a striving to avoid inferiority scale.

Social rank theory suggests that mood variation is linked to the security a person feels in his/her social domain and the extent to which they are sensitive to involuntary subordination (e.g. feeling defeated and feeling inferior). Previous studies looking at rank-related and competitive behaviour have often focused on striving for dominance, whereas social rank theory has focused on striving t...

متن کامل

- r Chapter 7 Striving for Specific Identities : The Social Reality of Self - Symbolizing

Striving for specific identities (e.9., lawver, mother, pious person) is not a strategic effort at self-presentation, but is rather a nonstrategic approach to self-construction. To understand which form such self-constructive efforts need to take in order to be effective, it is necessary to examine how individuals conceive of the intended identity goal state. My analysis of this issue-which dra...

متن کامل

Goal-striving stress, social economic status, and the mental health of black Americans.

Goal-striving stress refers to the discrepancy between aspirations and achievements, hard work and accomplishment, options and opportunities, and perhaps provides a pathway linking social structure and mental health. Although a number of scholars have speculated about the relationship between blocked opportunities and psychopathology, few studies have empirically examined associations between s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 14  شماره 

صفحات  -

تاریخ انتشار 1995