Next Article in Journal
Super-Activation as a Unique Feature of Secure Communication in Malicious Environments
Next Article in Special Issue
Computer-Aided Identification and Validation of Privacy Requirements
Previous Article in Journal
An Approach to the Match between Experts and Users in a Fuzzy Linguistic Environment
Article Menu

Export Article

Open AccessArticle
Information 2016, 7(2), 23;

Using Proven Reference Monitor Patterns for Security Evaluation

Center for Cyber Security Engineering and Technology, University of San Diego, San Diego, CA 92110, USA
Aesec Corporation, Palo Alto, CA 94301, USA
Authors to whom correspondence should be addressed.
Academic Editor: Willy Susilo
Received: 12 February 2016 / Revised: 5 April 2016 / Accepted: 14 April 2016 / Published: 26 April 2016
(This article belongs to the Special Issue Evaluating the Security of Complex Systems)
Full-Text   |   PDF [2884 KB, uploaded 26 April 2016]   |  


The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable. Just such an integrated set of security patterns was created decades ago based on the Reference Monitor abstraction. An associated systematic security engineering and evaluation methodology was codified as an engineering standard in the Trusted Computer System Evaluation Criteria (TCSEC). This paper explains how the TCSEC and its Trusted Network Interpretation (TNI) constitute a set of security patterns for large, complex and distributed systems and how those patterns have been repeatedly and successfully used to create and evaluate some of the most secure government and commercial systems ever developed. View Full-Text
Keywords: security pattern; Reference Monitor; security kernel; TCSEC; Orange Book; TNI; Mandatory Access Control (MAC) security pattern; Reference Monitor; security kernel; TCSEC; Orange Book; TNI; Mandatory Access Control (MAC)

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Heckman, M.R.; Schell, R.R. Using Proven Reference Monitor Patterns for Security Evaluation. Information 2016, 7, 23.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top