Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Software Quality Improvement Through Static Analysis and Annotation. Software forms the basis of critical infrastructure that supports industries such as electronic commerce. Flaws in the software can lead to failure of the overall system, or allow the security mechanisms of the software to be by-passed. This project is developing methods to improve the quality of software by finding common flaws that lead to security vulnerabilities or runtime failures. Within Australia, it is estimated that th ....Software Quality Improvement Through Static Analysis and Annotation. Software forms the basis of critical infrastructure that supports industries such as electronic commerce. Flaws in the software can lead to failure of the overall system, or allow the security mechanisms of the software to be by-passed. This project is developing methods to improve the quality of software by finding common flaws that lead to security vulnerabilities or runtime failures. Within Australia, it is estimated that there are approximately 75,000 software developers who make substantial use of C/C++ and who could benefit from the availability of better automatic static analysis tools to improve both the quality of the code they produce and their productivity.Read moreRead less