메뉴 건너뛰기




Volumn 5295 LNCS, Issue , 2008, Pages 99-114

Verified protection model of the seL4 microkernel

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL;

EID: 70350504088     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-87873-5_11     Document Type: Conference Paper
Times cited : (27)

References (20)
  • 1
    • 0030376097 scopus 로고    scopus 로고
    • Conspiracy and information flow in the take-grant protection model
    • Bishop, M.: Conspiracy and information flow in the take-grant protection model. Journal of Computer Security 4(4), 331-360 (1996)
    • (1996) Journal of Computer Security , vol.4 , Issue.4 , pp. 331-360
    • Bishop, M.1
  • 2
    • 0018685670 scopus 로고
    • The transfer of information and authority in a protection system
    • ACM Press, New York
    • Bishop, M., Snyder, L.: The transfer of information and authority in a protection system. In: 7th SOSP, pp. 45-54. ACM Press, New York (1979)
    • (1979) 7th SOSP , pp. 45-54
    • Bishop, M.1    Snyder, L.2
  • 3
    • 57049118010 scopus 로고    scopus 로고
    • Cock, D., Klein, G., Sewell, T.: Secure microkernels, state monads and scalable refinement. In: Munoz, C., Ait, O. (eds.) TPHOLs 2008. LNCS 5170 (to appear, 2008)
    • Cock, D., Klein, G., Sewell, T.: Secure microkernels, state monads and scalable refinement. In: Munoz, C., Ait, O. (eds.) TPHOLs 2008. LNCS 5170 (to appear, 2008)
  • 4
    • 0000338326 scopus 로고
    • Programming semantics for multiprogrammed computations
    • Dennis, J.B., Van Horn, E.C.: Programming semantics for multiprogrammed computations. CACM 9, 143-155 (1966)
    • (1966) CACM , vol.9 , pp. 143-155
    • Dennis, J.B.1    Van Horn, E.C.2
  • 5
    • 33750992489 scopus 로고    scopus 로고
    • Running the manual: An approach to high-assurance microkernel development
    • Portland, OR, USA September
    • Derrin, P., Elphinstone, K., Klein, G., Cock, D., Chakravarty, M.M.T.: Running the manual: An approach to high-assurance microkernel development. In: ACM SIGPLAN Haskell WS, Portland, OR, USA (September 2006)
    • (2006) ACM SIGPLAN Haskell WS
    • Derrin, P.1    Elphinstone, K.2    Klein, G.3    Cock, D.4    Chakravarty, M.M.T.5
  • 6
    • 70350589302 scopus 로고    scopus 로고
    • Elkaduwe, D., Derrin, P., Elphinstone, K.: A memory allocation model for an embedded microkernel. In: Proc. 1st MicroKernels for Embedded Systems, Sydney, Australia, pp. 28-34. NICTA (January 2007)
    • Elkaduwe, D., Derrin, P., Elphinstone, K.: A memory allocation model for an embedded microkernel. In: Proc. 1st MicroKernels for Embedded Systems, Sydney, Australia, pp. 28-34. NICTA (January 2007)
  • 8
    • 70350594176 scopus 로고    scopus 로고
    • Elphinstone, K., Klein, G., Kolanski, R.: Formalising a high-performance microkernel. In: Leino, R. (ed.) Workshop on Verified Software: Theories, Tools, and Experiments (VSTTE 2006), Microsoft Research Technical Report MSR-TR-2006-117, pp. 1-7, Seattle, USA (August 2006)
    • Elphinstone, K., Klein, G., Kolanski, R.: Formalising a high-performance microkernel. In: Leino, R. (ed.) Workshop on Verified Software: Theories, Tools, and Experiments (VSTTE 2006), Microsoft Research Technical Report MSR-TR-2006-117, pp. 1-7, Seattle, USA (August 2006)
  • 9
    • 0007935332 scopus 로고
    • KeyKOS architecture
    • Hardy, N.: KeyKOS architecture. Operat. Syst. Rev. 19(4), 8-25 (1985)
    • (1985) Operat. Syst. Rev , vol.19 , Issue.4 , pp. 8-25
    • Hardy, N.1
  • 10
    • 0016984825 scopus 로고
    • Protection in operating systems
    • Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. In: CACM, pp. 561-471 (1976)
    • (1976) CACM , pp. 561-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 11
    • 56349105212 scopus 로고    scopus 로고
    • Wombat: A portable user-mode Linux for embedded systems
    • Canberra April
    • Leslie, B., van Schaik, C., Heiser, G.: Wombat: A portable user-mode Linux for embedded systems. In: 6th Linux.Conf.Au, Canberra (April 2005)
    • (2005) 6th Linux.Conf.Au
    • Leslie, B.1    van Schaik, C.2    Heiser, G.3
  • 12
    • 84883516955 scopus 로고
    • On μ-kernel construction
    • Copper Mountain, CO, USA, pp, December
    • Liedtke, J.: On μ-kernel construction. In: 15th SOSP, Copper Mountain, CO, USA, pp. 237-250 (December 1995)
    • (1995) 15th SOSP , pp. 237-250
    • Liedtke, J.1
  • 13
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • Lipton, R.J., Snyder, L.: A linear time algorithm for deciding subject security. J. ACM 24(3), 455-464 (1977)
    • (1977) J. ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 15
    • 70350602735 scopus 로고    scopus 로고
    • Nipkow, T., Paulson, L., Wenzel, M.: Isabelle/HOL. LNCS, 2283. Springer, Heidelberg (2002)
    • Nipkow, T., Paulson, L., Wenzel, M.: Isabelle/HOL. LNCS, vol. 2283. Springer, Heidelberg (2002)
  • 17
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • Technical report December
    • Rushby, J.: Noninterference, transitivity, and channel-control security policies. Technical report (December 1992), http://www.csl.sri.com/papers/csl- 92-2/
    • (1992) , pp. 92-92
    • Rushby, J.1
  • 18
    • 33646747385 scopus 로고    scopus 로고
    • The practical application of a decidable access model
    • Technical Report SRL-2003-04, SRL, Baltimore, MD 21218 November
    • Shapiro, J.S.: The practical application of a decidable access model. Technical Report SRL-2003-04, SRL, Baltimore, MD 21218 (November 2003)
    • (2003)
    • Shapiro, J.S.1
  • 19
    • 0001421170 scopus 로고    scopus 로고
    • EROS: A fast capability system
    • Charleston, SC, USA, pp, December
    • Shapiro, J.S., Smith, J.M., Farber, D.J.: EROS: A fast capability system. In: 17th SOSP, Charleston, SC, USA, pp. 170-185 (December 1999)
    • (1999) 17th SOSP , pp. 170-185
    • Shapiro, J.S.1    Smith, J.M.2    Farber, D.J.3
  • 20
    • 0019713652 scopus 로고
    • Theft and conspiracy in the Take-Grant protection model
    • Snyder, L.: Theft and conspiracy in the Take-Grant protection model. Journal of Computer and System Sciences 23(3), 333-347 (1981)
    • (1981) Journal of Computer and System Sciences , vol.23 , Issue.3 , pp. 333-347
    • Snyder, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.