{"title":"安全关键型软件与安全关键型软件","authors":"Peter B. Gutgarts, A. Temin","doi":"10.1109/THS.2010.5654973","DOIUrl":null,"url":null,"abstract":"Significant knowledge exists in the field of safety-critical software design and implementation. Formal design methods and high quality compilers allow production of software products with desired behavioral parameters. Generally, if we know what behavior parameters are needed then we can achieve them in the software code. But do we know what behavioral parameters are needed for security-critical software? Can application security be specified in a way suitable for the machine code so that we can achieve software that is as secure as it is safe?","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Security-critical versus safety-critical software\",\"authors\":\"Peter B. Gutgarts, A. Temin\",\"doi\":\"10.1109/THS.2010.5654973\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Significant knowledge exists in the field of safety-critical software design and implementation. Formal design methods and high quality compilers allow production of software products with desired behavioral parameters. Generally, if we know what behavior parameters are needed then we can achieve them in the software code. But do we know what behavioral parameters are needed for security-critical software? Can application security be specified in a way suitable for the machine code so that we can achieve software that is as secure as it is safe?\",\"PeriodicalId\":106557,\"journal\":{\"name\":\"2010 IEEE International Conference on Technologies for Homeland Security (HST)\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE International Conference on Technologies for Homeland Security (HST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/THS.2010.5654973\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2010.5654973","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Significant knowledge exists in the field of safety-critical software design and implementation. Formal design methods and high quality compilers allow production of software products with desired behavioral parameters. Generally, if we know what behavior parameters are needed then we can achieve them in the software code. But do we know what behavioral parameters are needed for security-critical software? Can application security be specified in a way suitable for the machine code so that we can achieve software that is as secure as it is safe?