메뉴 건너뛰기




Volumn 137 LNCS, Issue , 1982, Pages 352-367

Proof of separability A verification technique for a class of security kernels

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTERS;

EID: 0020273088     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-11494-7_23     Document Type: Conference Paper
Times cited : (57)

References (22)
  • 1
    • 0018806907 scopus 로고
    • Security Kernels: Are they the Answer to the Computer Security Problem?
    • Presented at the, San Francisco, CA
    • Ames, S.R. Jr.., “Security Kernels: Are they the Answer to the Computer Security Problem?”, Presented at the 1979 WESCON Professional Program, San Francisco, CA. (September 1979).
    • (1979) WESCON Professional Program
    • Ames, S.R.1
  • 3
    • 0016873760 scopus 로고
    • Penetrating an Operating System: A Study of VM/370 Integrity
    • Attanasio, C.R., P.W. Markstein, and R.J. Phillips, “Penetrating an Operating System: a Study of VM/370 Integrity”, IBM Systems Journal Vol. 15(1), pp.102–116 (1976).
    • (1976) IBM Systems Journal , vol.15 , Issue.1 , pp. 102-116
    • Attanasio, C.R.1    Markstein, P.W.2    Phillips, R.J.3
  • 5
    • 85072523275 scopus 로고
    • KSOS - Development Methodology for a Secure Operating System
    • Berson, T.A. and G.L. Barksdale Jr.., “KSOS - Development Methodology for a Secure Operating System”, AFIPS Conference Proceedings Vol. 48, pp. 365–371 (1979).
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 365-371
    • Berson, T.A.1    Barksdale, G.L.2
  • 6
    • 85034220137 scopus 로고
    • Technical Report 170, Computing Laboratory, University of Newcastle upon Tyne, England, To appear in Acta Informatica)
    • Cristian, F., “Robust Data Types”, Technical Report 170, Computing Laboratory, University of Newcastle upon Tyne, England (1981). (To appear in Acta Informatica).
    • (1981) Robust Data Types
    • Cristian, F.1
  • 9
    • 84976834237 scopus 로고
    • WDL-TR7809, Ford Aerospace and Communications Corporation, Palo Alto, CA. (March
    • “KSOS Verification Plan”, WDL-TR7809, Ford Aerospace and Communications Corporation, Palo Alto, CA. (March 1978).
    • (1978) KSOS Verification Plan
  • 11
    • 85072542009 scopus 로고
    • A Security Retrofit of VM/370
    • Gold, B.D. et al., “A Security Retrofit of VM/370”, AFIPS Conference Proceedings Vol. 48, pp.335–344 (1979).
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 335-344
    • Gold, B.D.1
  • 13
    • 0018907788 scopus 로고
    • A Penetration Analysis of the Michigan Terminal System
    • Hebbard, B. et al., “A Penetration Analysis of the Michigan Terminal System”, ACM Operating Systems Review Vol. 14(1), pp.7–20 (January 1980).
    • (1980) ACM Operating Systems Review , vol.14 , Issue.1 , pp. 7-20
    • Hebbard, B.1
  • 14
    • 0015672289 scopus 로고
    • A Note on the Confinement Problem
    • Lampson, B.W., “A Note on the Confinement Problem”, CACM Vol. 16(10), pp.613–615 (October 1973).
    • (1973) CACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 15
    • 0016600186 scopus 로고
    • Operating System Penetration
    • Linde, R.R., “Operating System Penetration”, AFIPS Conference Proceedings Vol. 44, pp.361–368 (1975).
    • (1975) AFIPS Conference Proceedings , vol.44 , pp. 361-368
    • Linde, R.R.1
  • 16
    • 0016951438 scopus 로고
    • Security Kernel Validation in Practice
    • Millen, J.K., “Security Kernel Validation in Practice”, CACM Vol. 19(5), pp.243–250 (May 1976).
    • (1976) CACM , vol.19 , Issue.5 , pp. 243-250
    • Millen, J.K.1
  • 18
    • 0018019384 scopus 로고
    • A Model for Verification of Data Security in Operating Systems
    • Popek, G.J. and D.A. Farber, “A Model for Verification of Data Security in Operating Systems”, CACM Vol. 21(9), pp.737–749 (September 1978).
    • (1978) CACM , vol.21 , Issue.9 , pp. 737-749
    • Popek, G.J.1    Farber, D.A.2
  • 20
    • 84909774589 scopus 로고
    • Technical Report, Computing Laboratory, University of Newcastle upon Tyne
    • Rushby, J.M., “Verification of Secure Systems”, Technical Report No. 166, Computing Laboratory, University of Newcastle upon Tyne (September 1981).
    • (1981) Verification of Secure Systems , vol.166
    • Rushby, J.M.1
  • 21
    • 33748188187 scopus 로고
    • A Penetration Study of a Burroughs Large System
    • Wilkinson, A.L. et al., “A Penetration Study of a Burroughs Large System”, ACM Operating Systems Review Vol. 15(1), pp.14–25 (January 1981).
    • (1981) ACM Operating Systems Review , vol.15 , Issue.1 , pp. 14-25
    • Wilkinson, A.L.1
  • 22
    • 85072531344 scopus 로고
    • Applications for Multilevel Secure Operating Systems
    • Woodward, J.P.L., “Applications for Multilevel Secure Operating Systems”, AFIPS Conference Proceedings Vol. 48, pp.319–328 (1979).
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 319-328
    • Woodward, J.P.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.