메뉴 건너뛰기




Volumn 1427 LNCS, Issue , 1998, Pages 49-56

A formal method experience at secure computing corporation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED ANALYSIS;

EID: 84863938913     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0028731     Document Type: Conference Paper
Times cited : (1)

References (17)
  • 3
    • 0003969635 scopus 로고
    • Department of defense trusted computer system evaluation criteria
    • National Computer Security Center NCSC, Fort Meade, Maryland
    • National Computer Security Center. Department of Defense Trusted Computer System Evaluation Criteria. Technical report, US National Computer Security Center, NCSC, Fort Meade, Maryland, 1985.
    • (1985) Technical Report, US National Computer Security Center
  • 4
    • 85084164023 scopus 로고    scopus 로고
    • A comparison of methods for implementing adaptive security poli cies
    • San Antonio, TX, January USENIX Association
    • Michael Carney and Brian Loe. A comparison of methods for implementing adaptive security poli cies. In Seventh USENIX Security Symposium Proceedings, pages 1-14, San Antonio, TX, January 1998. USENIX Association.
    • (1998) Seventh USENIX Security Symposium Proceedings , pp. 1-14
    • Carney, M.1    Loe, B.2
  • 5
    • 84863929892 scopus 로고    scopus 로고
    • Secure Computing Corporation Technical report
    • Secure Computing Corporation. DTOS Composability Study. Technical report, 1997. http://www.securecomputing.com/randt/HTML/technical-docs.html.
    • (1997) DTOS Composability Study
  • 7
    • 0025103204 scopus 로고
    • Constructively using noninterference to analyze systems
    • 1990 IEEE Comput Soc Symp Res Secur Privacy
    • Todd Fine. Constructively Using Noninterference to Analyze Systems. In IEEE Symposium on Security and Privacy, pages 162-169, Oakland, CA, May 1990. (Pubitemid 20739284)
    • (1990) Proceedings of the Symposium on Security and Privacy , pp. 162-169
    • Fine Todd1
  • 11
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • Oakland, CA, May
    • John McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1994.
    • (1994) Proceedings of the IEEE Symposium on Security and Privacy
    • McLean, J.1
  • 12
    • 85084163247 scopus 로고
    • Providing policy control over object operations in a mach based system
    • Salt Lake City, UT, June USENIX Association
    • Spencer E. Minear. Providing policy control over object operations in a mach based system. In Fifth USENIX Security Symposium Proceedings, pages 141-156, Salt Lake City, UT, June 1995. USENIX Association.
    • (1995) Fifth USENIX Security Symposium Proceedings , pp. 141-156
    • Minear, S.E.1
  • 13
    • 0003524744 scopus 로고
    • The PVS specification language (Beta release)
    • SRI International Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, June
    • Owre, Shankar and Rushby. The PVS Specification Language (Beta Release). User Manual, SRI International Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, June 1993. http://www.csl.sri.com/reports/ pvs-language.dvi,ps.Z.
    • (1993) User Manual
    • Owre, S.1    Rushby2
  • 14
    • 84863894510 scopus 로고
    • A tutorial introduction to PVS
    • SRI International Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, June
    • Owre, Shankar, Rushby, Crow and Srivas. A Tutorial Introduction to PVS. User Manual, SRI International Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, June 1995. http://www.csl.sri.com/sri-csl-fm. html.
    • (1995) User Manual
    • Owre, S.1    Rushby, C.2
  • 15
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, December
    • John Rushby. Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, SRI International Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, December 1992. http://www.csl.sri.com/csl-92-2.html.
    • (1992) Technical Report CSL-92-02, SRI International Computer Science Laboratory
    • Rushby, J.1
  • 17
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • February
    • Ravi Sandhu, Edward Coyne, Hal Feinstein, and Charles Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.