skip to main content
opinion
Free Access

Security assurance

Published:23 October 2015Publication History
Skip Abstract Section

Abstract

How can customers tell they are getting it?

References

  1. Denning, D.E. Toward more secure software. Commun. ACM 58, 4 (Apr. 2015), 24--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Howard, M. and Lipner, S.B. The Security Development Lifecycle. Microsoft Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ISO/IEC, ISO/IEC 27034-1:2011. Information technology---Security techniques---Application security---Part 1: Overview and concepts; http://www.iso.org/iso/catalogue_detail.htm?csnumber=44378.Google ScholarGoogle Scholar
  4. Linux Foundation. Core Infrastructure Initiative site; https://www.coreinfrastructure.org/.Google ScholarGoogle Scholar
  5. Lipner, S.B. The trustworthy computing security development lifecycle. In Proceedings of the Twentieth Annual Computer Security Applications Conference (Tucson, AZ, 2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Lipner, S.B., Jaeger, T., and Zurko, M.E. Lessons from VAX SVS for high assurance VM systems. IEEE Security and Privacy (Nov.-Dec. 2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Microsoft Corporation. Life in the Digital Crosshairs, 2014; http://bit.ly/1NnOoS4.Google ScholarGoogle Scholar
  8. Panel: Security and Source Code Access: Issues and Realities. In Proceedings of the IEEE Symposium on Security and Privacy, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security assurance

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 58, Issue 11
              November 2015
              112 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/2838899
              • Editor:
              • Moshe Y. Vardi
              Issue’s Table of Contents

              Copyright © 2015 Owner/Author

              Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 23 October 2015

              Check for updates

              Qualifiers

              • opinion
              • Popular
              • Un-reviewed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format