Previous Next Methods Allocation  
Annex 1  
5.1.2.2 Shared Resource Methodology (SRM)  

  Shared Resource Methodology (SRM)

Contents  
  • 1 Identification/Definition of the Method
  • 2 Brief Characteristic of the Method
  • 3 Application of the Method in the V-Model
  • 4 Interfaces
  • 5 Further Information
  • 6 Literature
  • 1 Identification/Definition of the Method

    /Kemmerer, 1983/

    2 Brief Characteristic of the Method

    Within SRM (Shared Resource Methodology) a matrix with the subjects and the objects of the analysis basis (formal or informal specification or possibly program) is generated. The access authorizations of the subjects to the objects are entered in the items of the matrix. By means of these entries it is investigated whether an impermissible information flow is possible. The success of the method strongly depends on the choice of suitable subjects and objects.

    3 Application of the Method in the V-Model

    Within the V-Model an analysis of covert channels is not required. The ACC - Analysis of Covert Channels has to be performed if within the security requirements according to /ITSEC/ covert channels are excluded.

    4 Interfaces

    In principle, there are interfaces to all methods that generate an analysis basis (program, formal specification).

    5 Further Information

    - not applicable -

    6 Literature

    /Kemmerer, 1983/ Description of the Shared Resource Methodology

    Previous Next GDPA Online Last Updated 01.Jan.2002 Updated by Webmaster Last Revised 01.Jan.2002 Revised by Webmaster