메뉴 건너뛰기




Volumn 48, Issue 4, 2013, Pages 293-303

Verifying security invariants in expressoS

Author keywords

Automatic theorem proving; Microkernel; Mobile security; Programming by contracts

Indexed keywords

AUTOMATIC THEOREM PROVING; FUNCTIONAL CORRECTNESS; LATENCY TIME; MICROKERNEL; MOBILE SECURITY;

EID: 84880117726     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/2499368.2451148     Document Type: Conference Paper
Times cited : (27)

References (40)
  • 1
    • 0004200684 scopus 로고
    • Technical report, HQ Electronic Systems Division (AFSC), Oct., ESDTR-73-51
    • J. P. Anderson. Computer security technology planning study. Technical report, HQ Electronic Systems Division (AFSC), Oct. 1972. ESDTR-73-51.
    • (1972) Computer Security Technology Planning Study
    • Anderson, J.P.1
  • 5
    • 0024772234 scopus 로고
    • Kit: A study in operating system verification
    • W. Bevier. Kit: A study in operating system verification. IEEE Transactions on Software Engineering, 15:1382-1396, 1989.
    • (1989) IEEE Transactions on Software Engineering , vol.15 , pp. 1382-1396
    • Bevier, W.1
  • 17
    • 38349068551 scopus 로고    scopus 로고
    • Singularity: Rethinking the software stack
    • Apr
    • G. C. Hunt and J. R. Larus. Singularity: rethinking the software stack. ACM SIGOPS Operating Systems Review, 41(2):37-49, Apr. 2007.
    • (2007) ACM SIGOPS Operating Systems Review , vol.41 , Issue.2 , pp. 37-49
    • Hunt, G.C.1    Larus, J.R.2
  • 36
    • 0018983212 scopus 로고
    • Specification and verification of the ucla unix security kernel
    • Feb
    • B. J. Walker, R. A. Kemmerer, and G. J. Popek. Specification and verification of the UCLA Unix security kernel. Communications of the ACM, 23(2):118-131, Feb. 1980.
    • (1980) Communications of the ACM , vol.23 , Issue.2 , pp. 118-131
    • Walker, B.J.1    Kemmerer, R.A.2    Popek, G.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.