Skip to main content

Security in Large System Acquisition

  • Conference paper
  • 413 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2959))

Abstract

Large systems are typically composed of multiple hardware and software components. Most of the components are Commercial Off The Shelf (COTS) products. All of the COTS components have security properties, as will the custom software, and the resultant system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fiscal Year 2003 FAA Budget in Brief (February 2002), available at http://www.faa.gov/aba/

  2. Gamble, D., Hemenway, J.: The Use of Generic Architectures in System Integration. In: Proceedings 18th National Information Systems Security Conference, October 1995, pp. 431–446 (1995)

    Google Scholar 

  3. Common Criteria Project, Common Criteria for Information Technology Security Evaluation, version 2.1, Or, International Standard ISO/IEC 15408 (1999-12); Parts 1-3, Information Technology Security Techniques Common Criteria for IT Security Evaluation (CCITSE) (1999), Available from http://csrc.nist.gov/cc/ , http://www.radium.ncsc.mil/tpep/library/ccitse/ccitse.html , or http://www.commoncriteria.org/cc/cc.html

  4. Grance, T., Hash, J., Stevens, M.: Security Considerations in the Information System Development Life Cycle, National Institute of Standards and Technology (NIST) Special Publication (SP) 800-64 (October 2003), Also available at http://csrc.ncsl.nist.gov/publications/nistpubs/800-64/NIST-SP800-64.pdf

  5. Abrams, M.D.: FAA System Security Testing and Evaluation, MITRE Technical Report 02W0000059, The MITRE Corporation, McLean, VA (May 2003), Available from http://www.mitre.org/work/tech_papers/tech_papers_03/abrams_faa/index.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abrams, M., Veoni, J., Britton, R.K. (2004). Security in Large System Acquisition. In: Kazman, R., Port, D. (eds) COTS-Based Software Systems. ICCBSS 2004. Lecture Notes in Computer Science, vol 2959. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24645-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24645-9_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21903-3

  • Online ISBN: 978-3-540-24645-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics