A formal method experience at secure computing corporation
- 1 January 1998
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Noninterference and unwinding for LOCKPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- LOCK trek: navigating uncharted spacePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Assuring Distributed Trusted MachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A framework for compositionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A general theory of composition for trace sets closed under selective interleaving functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Implementing RBAC on a type enforced systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Experience with Adaptive Security Policies.Published by Defense Technical Information Center (DTIC) ,1998
- Role-based access control modelsComputer, 1996
- Constructively using noninterference to analyze systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990