You are on page 1of 1

Engineers (IEEE) Standard for Software Project Management Plans, IEEE Std 1058-

1998.
Standard conventions are used within this document to direct the reader to specific
sections of the text.
The term security policy can also refer to specific security rules for specific
systems,
or to specific control procedures and processes. In the context of trusted
computing,
as we will discuss in Chapter 27, it refers to formal models for confidentiality
and integrity. In this chapter though, we use the term to refer to the description
of
the overall security objectives and strategies, as described at the start of this
section. These sections provide instructions and explanations and require users to
insert their own project-specific information. The conventions used in this
document are shown below

You might also like