skip to main content
10.1145/2420950.2420973acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Trust engineering: rejecting the tyranny of the weakest link

Published:03 December 2012Publication History

ABSTRACT

In 2002 [1], the National Security Agency's Information Assurance Research Group coined the term, trust engineering, to describe a methodology for making use of software of uncertain provenance in mission-critical systems. Today, the loss of control that made software so hard to trust then applies to the rest of the supply chain as well. The discipline we described in the internal paper, <u>Trust-engineering: An Assurance Strategy for Software-based Systems</u>, no longer seems heretical today, even at NSA. Ten years later, we revisit the principles of trust engineering, compare the mechanisms available to us today with the practices of the past, and explore the construction of systems that are stronger than their weakest link.

References

  1. Alexander, S. and Meushaw, R. 2002. Trust-engineering: An Assurance Strategy for Software-based Systems. NSA unpublished paper.Google ScholarGoogle Scholar
  2. Meushaw, R. and Simard, D. 2008. NetTop Eight Years Later. The Next Wave. 27, 3 (April, 2008) pp 10--21.Google ScholarGoogle Scholar
  3. National Cyber Leap Year Summit Co-chairs' Report, 2009: http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf.Google ScholarGoogle Scholar
  4. http://www.nsa.gov/business/programs/tapo.shtmlGoogle ScholarGoogle Scholar
  5. http://www.nsa.gov/ia/programs/csfc_program/index.shtmlGoogle ScholarGoogle Scholar
  6. http://365.rsaconference.com/docs/DOC-3509Google ScholarGoogle Scholar
  7. http://csrc.nist.gov/groups/SMA/ispab/documents/minutes/2009-04/ispab_mswanson-nist_april2009.pdfGoogle ScholarGoogle Scholar

Index Terms

  1. Trust engineering: rejecting the tyranny of the weakest link

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ACSAC '12: Proceedings of the 28th Annual Computer Security Applications Conference
      December 2012
      464 pages
      ISBN:9781450313124
      DOI:10.1145/2420950

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 December 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      ACSAC '12 Paper Acceptance Rate44of231submissions,19%Overall Acceptance Rate104of497submissions,21%
    • Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader