Access Restriction

Author Denkins, Pam ♦ LeGrand, Sue
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Computer programming, programs & data
Abstract In applied efforts to reduce the cost of the software life-cycle process, government agencies and industry are focusing on the reusability of software. Software reusability, both between various automated information systems and software projects, has become a primary requirement in many requests for proposals. Software reusability is, perhaps, one of the most significant low technology, cost-cutting methods available to the data processing community today. Without effective protective measures established and in place, however, reusing software can result in the proliferation of malicious code, resulting in the loss of dollars, possibly even lives. An effective protection plan for reusable software must combine verification of the software by the developer, appropriate protection of the software during both storage and use, guaranteed delivery and integrity when software is transferred, and re-verification of software by the new user prior to incorporation in a new design. NASA's approach to software protection establishes four hierarchical levels of automated information sensitivity and criticality and provides guidance for appropriate protective measures for each level. We advocate the addition of protection domains to the current NASA schema.
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 1990-01-01
Publisher Place New York
Journal ACM SIGSAC Review (SGSC)
Volume Number 9
Issue Number 4
Page Count 16
Starting Page 3
Ending Page 18

Open content in new tab

   Open content in new tab
Source: ACM Digital Library