Repository logo
Log In(current)
  1. Home
  2. Colleges & Schools
  3. Graduate School
  4. Masters Theses
  5. A transaction flow approach to a computer operating environment security evaluation
Details

A transaction flow approach to a computer operating environment security evaluation

Date Issued
December 1, 1989
Author(s)
Hicks, Susan E.
Advisor(s)
William J. McClain
Additional Advisor(s)
David W. Straight
Tom Dunigan
Permanent URI
https://trace.tennessee.edu/handle/20.500.14382/34445
Abstract

This thesis presents the application of a software security evaluation methodology to a computer operating environment based on the VAX/VMS operating system. The evaluation methodology is based on a transaction flow analysis approach that involves the systematic analysis of security exposures and controls in a computer operating environment. The system is viewed as a set of transactions performed on the objects of the system with each transaction represented in a data flow diagram. The objectives of the evaluation methodology are to identify the exposures that exist in a system, to determine the controls provided to protect those exposures, and to assess the effectiveness of the controls in preventing or detecting exploitation of the exposures.

Degree
Master of Science
Major
Computer Science
File(s)
Thumbnail Image
Name

Thesis89H535.pdf

Size

5.13 MB

Format

Unknown

Checksum (MD5)

466ffe780c81ca00c787c12aa5a8a31c

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Privacy policy
  • End User Agreement
  • Send Feedback
  • Contact
  • Libraries at University of Tennessee, Knoxville
Repository logo COAR Notify