skip to main content
opinion
Free Access

Cyber defense triad for where security matters

Published:28 October 2016Publication History
Skip Abstract Section

Abstract

Dramatically more trustworthy cyber security is a choice.

References

  1. Ames Jr, S.R., Gasser, M., and Schell, R.R. Security kernel design and implementation: An introduction. Computer 16, 7 (1983), 14--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Anderson, E.A., Irvine, C.E., and Schell, R.R. Subversion as a threat in information warfare. J. Inf. Warfare 3 (2004), 51--64.Google ScholarGoogle Scholar
  3. Clark, P., Irvine, C. and Nguyen, T. Design Principles for Security. NIST Special Publication 800--160, September 2016, pp. 207--221; http://csrc.nist.gov/publications/drafts/800-160/sp800_160_final-draft.pdfGoogle ScholarGoogle Scholar
  4. Heckman, M.R. and Schell, R.R. Using proven reference monitor patterns for security evaluation. Information 7, 2 (Apr. 2016); http://dx.doi.org/10.3390/info7020023Google ScholarGoogle ScholarCross RefCross Ref
  5. Higgins, K.J. IBM: The security business 'has no future.' Information Week Dark Reading, (4/10/2008); http://www.darkreading.com/ibm-the-security-business-has-no-future/d/d-id/1129423Google ScholarGoogle Scholar
  6. Lipner, S.B. Security assurance. Commun. ACM 58, 11 (Nov. 2015), 24--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Schell, R.R. A University Education Cyber Security Paradigm Shift. Presented at the National Initiative for Cybersecurity Education (NICE), (San Diego, CA, Nov. 2015); https://www.fbcinc.com/e/nice/ncec/presentations/2015/Schell.pdfGoogle ScholarGoogle Scholar
  8. Schell, R.R., Downey, P.J. and Popek, G.J. Preliminary Notes on the Design of Secure Military Computer Systems. ESD, Air Force Systems Command, Hanscom AFB, MA. {MCI-73-1}, Jan 1973; http://csrc.nist.gov/publications/history/sche73.pdfGoogle ScholarGoogle Scholar

Index Terms

  1. Cyber defense triad for where security matters

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 59, Issue 11
      November 2016
      118 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3013530
      • Editor:
      • Moshe Y. Vardi
      Issue’s Table of Contents

      Copyright © 2016 Copyright is held by the owner/author(s)

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 October 2016

      Check for updates

      Qualifiers

      • opinion
      • Popular
      • Un-reviewed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format