메뉴 건너뛰기




Volumn 6898 LNCS, Issue , 2011, Pages 325-340

seL4 enforces integrity

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL PROPERTIES; ISABELLE/HOL; SECURITY PROPERTIES; SYSTEM COMPOSITION; UPPER BOUND; WRITE OPERATIONS;

EID: 80052184715     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22863-6_24     Document Type: Conference Paper
Times cited : (57)

References (20)
  • 2
    • 80052182401 scopus 로고    scopus 로고
    • Towards proving security in the presence of large untrusted components
    • Klein, G., Huuck, R., Schlich, B. (eds.)
    • Andronick, J., Greenaway, D., Elphinstone, K.: Towards proving security in the presence of large untrusted components. In: Klein, G., Huuck, R., Schlich, B. (eds.) 5th SSV. USENIX, Vancouver (2010)
    • 5th SSV. USENIX, Vancouver (2010)
    • Andronick, J.1    Greenaway, D.2    Elphinstone, K.3
  • 4
    • 74249111569 scopus 로고    scopus 로고
    • A verified shared capability model
    • Klein, G., Huuck, R., Schlich, B. (eds.) Elsevier, Amsterdam
    • Boyton, A.: A verified shared capability model. In: Klein, G., Huuck, R., Schlich, B. (eds.) 4th SSV. ENTCS, vol. 254, pp. 25-44. Elsevier, Amsterdam (2009)
    • (2009) 4th SSV. ENTCS , vol.254 , pp. 25-44
    • Boyton, A.1
  • 5
    • 57049118010 scopus 로고    scopus 로고
    • Secure microkernels, state monads and scalable refinement
    • Mohamed, O.A., Muñoz, C., Tahar, S. (eds.) TPHOLs 2008. Springer, Heidelberg
    • Cock, D., Klein, G., Sewell, T.: Secure microkernels, state monads and scalable refinement. In: Mohamed, O.A., Muñoz, C., Tahar, S. (eds.) TPHOLs 2008. LNCS, vol. 5170, pp. 167-182. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5170 , pp. 167-182
    • Cock, D.1    Klein, G.2    Sewell, T.3
  • 6
    • 0000338326 scopus 로고
    • Programming semantics for multiprogrammed computations
    • Dennis, J.B., Van Horn, E.C.: Programming semantics for multiprogrammed computations. CACM 9, 143-155 (1966)
    • (1966) CACM , vol.9 , pp. 143-155
    • Dennis, J.B.1    Van Horn, E.C.2
  • 7
    • 70350504088 scopus 로고    scopus 로고
    • Verified protection model of the seL4 microkernel
    • Shankar, N., Woodcock, J. (eds.) VSTTE 2008. Springer, Heidelberg
    • Elkaduwe, D., Klein, G., Elphinstone, K.: Verified protection model of the seL4 microkernel. In: Shankar, N., Woodcock, J. (eds.) VSTTE 2008. LNCS, vol. 5295, pp. 99-114. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5295 , pp. 99-114
    • Elkaduwe, D.1    Klein, G.2    Elphinstone, K.3
  • 9
    • 11944266314 scopus 로고    scopus 로고
    • Verifying information flow goals in security-enhanced linux
    • Guttman, J., Herzog, A., Ramsdell, J., Skorupka, C.: Verifying information flow goals in security-enhanced linux. J. Comp. Security 13, 115-134 (2005)
    • (2005) J. Comp. Security , vol.13 , pp. 115-134
    • Guttman, J.1    Herzog, A.2    Ramsdell, J.3    Skorupka, C.4
  • 10
    • 79851479431 scopus 로고    scopus 로고
    • Morgan & Claypool Publishers, San Francisco
    • Jaeger, T.: Operating System Security. Morgan & Claypool Publishers, San Francisco (2008)
    • (2008) Operating System Security
    • Jaeger, T.1
  • 11
    • 61949206747 scopus 로고    scopus 로고
    • Operating system verification - An overview
    • Klein, G.: Operating system verification - an overview. Sādhanā 34(1), 27-69 (2009)
    • (2009) Sādhanā , vol.34 , Issue.1 , pp. 27-69
    • Klein, G.1
  • 13
    • 70449657350 scopus 로고    scopus 로고
    • Noninterference for a practical DIFC-based operating system
    • Krohn, M., Tromer, E.: Noninterference for a practical DIFC-based operating system. In: IEEE Symp. Security & Privacy, pp. 61-76 (2009)
    • (2009) IEEE Symp. Security & Privacy , pp. 61-76
    • Krohn, M.1    Tromer, E.2
  • 15
    • 0002179618 scopus 로고
    • Reprinted in
    • Reprinted in Operat. Syst. Rev. 8(1), 18-24 (1974)
    • (1974) Operat. Syst. Rev. , vol.8 , Issue.1 , pp. 18-24
  • 16
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • Lipton, R.J., Snyder, L.: A linear time algorithm for deciding subject security. J. ACM 24(3), 455-464 (1977)
    • (1977) J. ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 17
    • 77953259463 scopus 로고    scopus 로고
    • Analysing the information flow properties of object-capability patterns
    • Degano, P., Guttman, J.D. (eds.) FAST 2009. Springer, Heidelberg
    • Murray, T., Lowe, G.: Analysing the information flow properties of object-capability patterns. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 81-95. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5983 , pp. 81-95
    • Murray, T.1    Lowe, G.2
  • 18
    • 78650740853 scopus 로고    scopus 로고
    • Modeling and security analysis of a commercial real-time operating system kernel
    • Hardin, D.S. (ed.) Springer, Heidelberg
    • Richards, R.J.: Modeling and security analysis of a commercial real-time operating system kernel. In: Hardin, D.S. (ed.) Design and Verification of Microprocessor Systems for High-Assurance Applications, pp. 301-322. Springer, Heidelberg (2010)
    • (2010) Design and Verification of Microprocessor Systems for High-Assurance Applications , pp. 301-322
    • Richards, R.J.1
  • 20
    • 0018983212 scopus 로고
    • Specification and verification of the UCLA Unix security kernel
    • Walker, B.J., Kemmerer, R.A., Popek, G.J.: Specification and verification of the UCLA Unix security kernel. CACM 23(2), 118-131 (1980)
    • (1980) CACM , vol.23 , Issue.2 , pp. 118-131
    • Walker, B.J.1    Kemmerer, R.A.2    Popek, G.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.