메뉴 건너뛰기




Volumn , Issue , 2004, Pages 86-95

Lessons learned using Alloy to formally specify MLS-PCA trusted security architecture

Author keywords

Alloy; Formal specification; High assurance; Multilevel Security (MLS); Network security

Indexed keywords

ALLOYS; COMPUTER OPERATING SYSTEMS; COMPUTER SOFTWARE; MULTIPROCESSING SYSTEMS; PROJECT MANAGEMENT; SECURITY OF DATA; SPECIFICATIONS;

EID: 20444475069     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1029133.1029145     Document Type: Conference Paper
Times cited : (3)

References (35)
  • 3
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and Multics interpretation
    • ESD/AFSC, Hanscom AFB, Bedford, MA
    • David E. Bell and Leonard J. La Padula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA, 1975. Available at http://csrc.nist.gov/publications/ history/.
    • (1975) Technical Report , vol.ESD-TR-75-306
    • Bell, D.E.1    La Padula, L.J.2
  • 4
    • 1842550314 scopus 로고    scopus 로고
    • Viktors Berstis. Fundamentals of grid computing, 2002. Available at http://publib-b.boulder.ibm.com/Redbooks.nsf/RedbookAbstracts/redp3613.%html? Open.
    • (2002) Fundamentals of Grid Computing
    • Berstis, V.1
  • 11
    • 0002426352 scopus 로고    scopus 로고
    • Lightweight formal methods
    • April
    • Daniel Jackson and Jeannette M. Wing. Lightweight formal methods. IEEE Computer, pages 21-22, April 1996.
    • (1996) IEEE Computer , pp. 21-22
    • Jackson, D.1    Wing, J.M.2
  • 12
  • 13
    • 0024663305 scopus 로고
    • New methods for immediate revocation
    • Oakland, CA, USA, May. IEEE Computer Society
    • Paul A. Karger. New methods for immediate revocation. In 1989 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1989. IEEE Computer Society. Available at http://www.multicians.org/biblio.html.
    • (1989) 1989 IEEE Symposium on Security and Privacy
    • Karger, P.A.1
  • 14
    • 0141562559 scopus 로고
    • January
    • Lockheed Sanders, Inc., Hughes Aircraft, Motorola, and ISX Corporation. RASSP architecture guide rev. b, January 1995. Available at http://www.eda.org/ rassp/documents/sanders/arch_guide_b.pdf.
    • (1995) RASSP Architecture Guide Rev. B
  • 15
    • 84860940620 scopus 로고
    • Gemini Computers, Incorporated, Gemini Trusted Network Processor, version 1.01, June
    • National Computer Security Center. Final evaluation report, Gemini Computers, Incorporated, Gemini Trusted Network Processor, version 1.01, June 1995. Available at http://www.geminisecure.com/resource.htm.
    • (1995) Final Evaluation Report
  • 17
    • 84860952929 scopus 로고
    • network component M only, EPL entry CSC-EPL-94/008, September
    • National Security Agency. GTNP version 1.01, network component M only, EPL entry CSC-EPL-94/008, September 1994. Available at http://www.radium.ncsc. mil/tpep/epl/entries/CSC-EPL-94-008.html.
    • (1994) GTNP Version 1.01
  • 18
    • 84860954647 scopus 로고
    • network component MDIA, EPL entry CSC-EPL-94/006, September
    • National Security Agency. MLS LAN version 2.1, network component MDIA, EPL entry CSC-EPL-94/006, September 1994. Available at http://www.radium.ncsc. mil/tpep/epl/entries/CSC-EPL-94-006.html.
    • (1994) MLS LAN Version 2.1
  • 20
    • 85041481084 scopus 로고
    • Design and verification of secure systems
    • Pacific Grove, CA, USA, December. ACM Press
    • J. M. Rushby. Design and verification of secure systems. In Proceedings of the Eighth ACM Symposium on Operating Systems Principles, volume 15, pages 12 - 21, Pacific Grove, CA, USA, December 1981. ACM Press. Available at http://www.csl.sri.com/papers/sosp81/.
    • (1981) Proceedings of the Eighth ACM Symposium on Operating Systems Principles , vol.15 , pp. 12-21
    • Rushby, J.M.1
  • 21
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • Computer Science Laboratory, SRI International, Menlo Park, CA, December
    • John Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, Computer Science Laboratory, SRI International, Menlo Park, CA, December 1992. Available at http://www.csl.sri. com/papers/csl-92-2/.
    • (1992) Technical Report , vol.CSL-92-02
    • Rushby, J.1
  • 22
    • 0003954843 scopus 로고
    • Formal methods and their role in the certification of critical systems
    • Computer Science Laboratory, SRI International, Menlo Park, CA, March
    • John Rushby. Formal methods and their role in the certification of critical systems. Technical Report SRI-CSL-95-1, Computer Science Laboratory, SRI International, Menlo Park, CA, March 1995.
    • (1995) Technical Report , vol.SRI-CSL-95-1
    • Rushby, J.1
  • 23
    • 84860948040 scopus 로고
    • NASA Contractor Report 4673
    • August
    • Also available as NASA Contractor Report 4673, August 1995, and to be issued as part of the FAA Digital Systems Validation Handbook http://www.csl.sri.com/papers/csl-95-1/.
    • (1995) FAA Digital Systems Validation Handbook
  • 24
    • 0020779556 scopus 로고
    • A distributed secure system
    • July
    • John Rushby and Brian Randell. A distributed secure system. IEEE Computer, 16(7):55-67, July 1983. Available at http://www.csl.sri.com/users/ rushby/abstracts/computer83.
    • (1983) IEEE Computer , vol.16 , Issue.7 , pp. 55-67
    • Rushby, J.1    Randell, B.2
  • 25
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Ravi S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9-19, 1993. Available at http://citeseer.nj.nee.com/article/ sandhu93latticebased.html.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 26
    • 84944051800 scopus 로고    scopus 로고
    • Verification of a formal security model for multiapplicative smart cards
    • 6th European Symposium on Research in Computer Security (ESORICS), Toulouse, France, October. Springer
    • Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, and David Toll. Verification of a formal security model for multiapplicative smart cards. In 6th European Symposium on Research in Computer Security (ESORICS), volume 1895 of Lecture Notes in Computer Science, pages 17-36, Toulouse, France, October 2000. Springer. Available at http://citeseer.nj.nec.com/schellhorn00verification.html.
    • (2000) Lecture Notes in Computer Science , vol.1895 , pp. 17-36
    • Schellhorn, G.1    Reif, W.2    Schairer, A.3    Karger, P.A.4    Austel, V.5    Toll, D.6
  • 27
    • 12344286486 scopus 로고    scopus 로고
    • Cost profile of a highly assured, secure operating system
    • February
    • Richard E. Smith. Cost profile of a highly assured, secure operating system. ACM Transactions on Information and System Security, 4(1):72-101, February 2001.
    • (2001) ACM Transactions on Information and System Security , vol.4 , Issue.1 , pp. 72-101
    • Smith, R.E.1
  • 28
    • 0036712816 scopus 로고    scopus 로고
    • The F-22 on the line
    • John A. Tirpak. The F-22 on the line. Air Force Magazine, 85(09), 2002. Available at http://www.afa.org/magazine/Sept2002/0902raptor.html.
    • (2002) Air Force Magazine , vol.85 , Issue.9
    • Tirpak, J.A.1
  • 31
    • 0004259528 scopus 로고    scopus 로고
    • May
    • United States Joint Chiefs of Staff. Joint vision 2020, May 2000. Available at http://www.dtic.mil/jointvision/jvpub2.htm.
    • (2000) Joint Vision 2020
  • 32
    • 0003969638 scopus 로고
    • December
    • U.S. Department of Defense. DoD trusted computer system evaluation criteria, December 1985. Available at http://www.radium.ncsc.mil/tpep/library/ rainbow/index.html.
    • (1985) DoD Trusted Computer System Evaluation Criteria
  • 33
    • 84957649344 scopus 로고    scopus 로고
    • A model of cooperative noninterference for integrated modular avionics
    • San Jose, CA, January
    • Ben L. Di Vito. A model of cooperative noninterference for integrated modular avionics. In Proceedings of Dependable Computing for Critical Applications (DCCA-7), San Jose, CA, January 1999. Available to http://shemesh.larc.nasa.gov/people/bld/.
    • (1999) Proceedings of Dependable Computing for Critical Applications (DCCA-7)
    • Di Vito, B.L.1
  • 34
    • 0026851778 scopus 로고
    • BLACKER : Security for the DDN, examples of Al security engineering trades
    • Clark Weissman. BLACKER : Security for the DDN, examples of Al security engineering trades. In Proceedings of the IEEE Symposium on Security and Privacy, pages 286-292, 1992.
    • (1992) Proceedings of the IEEE Symposium on Security and Privacy , pp. 286-292
    • Weissman, C.1
  • 35
    • 20444499641 scopus 로고    scopus 로고
    • MLS-PCA: A high assurance security architecture for future avionics
    • Las Vegas, Nevada, USA, December. IEEE Press
    • Clark Weissman. MLS-PCA: A high assurance security architecture for future avionics. In Proceedings of the 19th Annual Computer Security Applications Conference, pages 2-13, Las Vegas, Nevada, USA, December 2003. IEEE Press.
    • (2003) Proceedings of the 19th Annual Computer Security Applications Conference , pp. 2-13
    • Weissman, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.