skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Peer review of the trusted software methodology

Abstract

The review and analysis of the Trusted Software Methodology (TSM) by a panel of experts in various areas of computer science, computer security, and engineering are reported. The approach to the conduct of the review is described, and a brief introduction to the TSM is provided. The findings from the review fall into three categories: achievements, desirable additions, and changes. In addition, several recommendations are made with respect to application of the TSM within the purview of the Ballistic Missile Defense Organization.

Authors:
 [1];  [2];  [3];  [4]
  1. Argonne National Lab., IL (United States)
  2. Argonne National Lab., IL (United States)|[Univ. of Maryland, Baltimore, MD (United States)
  3. Argonne National Lab., IL (United States)|[Univ. of California, Santa Barbara, CA (United States)
  4. Argonne National Lab., IL (United States)|[Portland State Univ., OR (United States)
Publication Date:
Research Org.:
Argonne National Lab., IL (United States)
Sponsoring Org.:
Department of Defense, Washington, DC (United States)
OSTI Identifier:
10138004
Report Number(s):
ANL/DIS-1
ON: DE94009241; TRN: 94:004297
DOE Contract Number:  
W-31109-ENG-38
Resource Type:
Technical Report
Resource Relation:
Other Information: PBD: Feb 1994
Country of Publication:
United States
Language:
English
Subject:
99 GENERAL AND MISCELLANEOUS//MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE; 45 MILITARY TECHNOLOGY, WEAPONRY, AND NATIONAL DEFENSE; COMPUTER CODES; SECURITY; SABOTAGE; BALLISTIC MISSILE DEFENSE; 990200; 450500; MATHEMATICS AND COMPUTERS; STRATEGIC DEFENSE INITIATIVE

Citation Formats

Chisholm, G.H., Gannon, J.D., Kemmerer, R.A., and McHugh, J. Peer review of the trusted software methodology. United States: N. p., 1994. Web. doi:10.2172/10138004.
Chisholm, G.H., Gannon, J.D., Kemmerer, R.A., & McHugh, J. Peer review of the trusted software methodology. United States. doi:10.2172/10138004.
Chisholm, G.H., Gannon, J.D., Kemmerer, R.A., and McHugh, J. Tue . "Peer review of the trusted software methodology". United States. doi:10.2172/10138004. https://www.osti.gov/servlets/purl/10138004.
@article{osti_10138004,
title = {Peer review of the trusted software methodology},
author = {Chisholm, G.H. and Gannon, J.D. and Kemmerer, R.A. and McHugh, J.},
abstractNote = {The review and analysis of the Trusted Software Methodology (TSM) by a panel of experts in various areas of computer science, computer security, and engineering are reported. The approach to the conduct of the review is described, and a brief introduction to the TSM is provided. The findings from the review fall into three categories: achievements, desirable additions, and changes. In addition, several recommendations are made with respect to application of the TSM within the purview of the Ballistic Missile Defense Organization.},
doi = {10.2172/10138004},
journal = {},
number = ,
volume = ,
place = {United States},
year = {1994},
month = {2}
}