U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Requirements for Secure Operating Systems (From Data Security and Data Processing, Volume 5, P 75-205, 1974 - See NCJ-89655)

NCJ Number
89658
Author(s)
F M Stepczyk
Date Published
1982
Length
131 pages
Annotation
This paper develops a comprehensive set of requirements, together with techniques for meeting them, which, when applied to a computer operating system, will serve as a basis for certifying that system as secure.
Abstract
It identifies the essential requirements and the vulnerabilities they are designed to shield and gives examples of various techniques to meet each requirement. Requirements are organized on three levels: security, installation, and technical. These requirements were developed by defining requirement criteria, considering system functions and types of threats, defining protection goals and elements, and surveying problem areas. Approximately 190 requirements are formulated, covering such areas as isolation, controlled access, identification, integrity, and surveillance. Diagrams, tables, and 121 references are supplied.