A Formal Method Experience at Secure Computing Corporation

作者: John Hoffman , Charlie Payne

DOI: 10.1007/BFB0028731

关键词:

摘要: We discuss the formal methods efforts for LOCK6, a secure operating system. emphasize how process of fit into development as whole, and lessons learned from our experience.

参考文章(11)
Spencer E. Minear, Providing policy control over object operations in a mach based system usenix security symposium. pp. 13- 13 ,(1995)
Brian Loe, Michael Carney, A comparison of methods for implementing adaptive security policies usenix security symposium. pp. 1- 1 ,(1998)
O.S. Saydjari, J.M. Beckman, J.R. Leaman, LOCK trek: navigating uncharted space ieee symposium on security and privacy. pp. 167- 175 ,(1989) , 10.1109/SECPRI.1989.36291
T. Fine, S.E. Minear, Assuring Distributed Trusted Mach ieee symposium on security and privacy. pp. 206- 217 ,(1993) , 10.1109/RISP.1993.287631
T. Fine, J.T. Haigh, R.C. O'Brien, D.L. Toups, Noninterference and unwinding for LOCK Proceedings of the Computer Security Foundations Workshop II. pp. 22- 28 ,(1989) , 10.1109/CSFW.1989.40583
J. Hoffman, Implementing RBAC on a type enforced system annual computer security applications conference. pp. 158- 163 ,(1997) , 10.1109/CSAC.1997.646185
T. Fine, A framework for composition Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96. pp. 199- 212 ,(1996) , 10.1109/CMPASS.1996.507888
T. Fine, Constructively using noninterference to analyze systems ieee symposium on security and privacy. pp. 162- 169 ,(1990) , 10.1109/RISP.1990.63847
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman, Role-based access control models IEEE Computer. ,vol. 29, pp. 38- 47 ,(1996) , 10.1109/2.485845