首页 | 本学科首页   官方微博 | 高级检索  
     


Security procedures for program libraries
Authors:William Hugh Murray
Affiliation:IBM Corporation, 44 South Broadway, White Plains, NY 10601, USA
Abstract:As computer programming has become more complex, management has become more concerned about its own ability to exercise appropriate control over the programmer.This paper describes an implementation of procedures, libraries, and separation of duties to improve security in programming. This implementation helps to limit scope, reveal programmer intent and fix accountability. It assumes and supports such improved programming technologies as top-down design, structured programming, psuedo-code documentation, use of librarians, inspections, and “walk-throughs”.While the implementation described here will contribute to security, it is not sufficient. Management will wish to consider the application of many other measures.
Keywords:Program Library   top-down design   structured programming   pseudo-code documentation   use of librarians   inspections    walk-throughs”     management control
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号