Security procedures for program libraries |
| |
Authors: | William Hugh Murray |
| |
Affiliation: | IBM Corporation, 44 South Broadway, White Plains, NY 10601, USA |
| |
Abstract: | As computer programming has become more complex, management has become more concerned about its own ability to exercise appropriate control over the programmer.This paper describes an implementation of procedures, libraries, and separation of duties to improve security in programming. This implementation helps to limit scope, reveal programmer intent and fix accountability. It assumes and supports such improved programming technologies as top-down design, structured programming, psuedo-code documentation, use of librarians, inspections, and “walk-throughs”.While the implementation described here will contribute to security, it is not sufficient. Management will wish to consider the application of many other measures. |
| |
Keywords: | Program Library top-down design structured programming pseudo-code documentation use of librarians inspections “ walk-throughs” management control |
本文献已被 ScienceDirect 等数据库收录! |
|