Applying a theory of modules and interfaces to security verification
- 10 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 136-155
- https://doi.org/10.1109/risp.1991.130782
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Noninterference and the composability of security propertiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- The existence of refinement mappingsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A relational notation for state transition systemsIEEE Transactions on Software Engineering, 1990
- A hookup theorem for multilevel securityIEEE Transactions on Software Engineering, 1990
- A VMM security kernel for the VAX architecturePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A simple approach to specifying concurrent systemsCommunications of the ACM, 1989
- Hierarchical correctness proofs for distributed algorithmsPublished by Association for Computing Machinery (ACM) ,1987
- A Unification of Computer and Network Security ConceptsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- What it means for a concurrent program to satisfy a specificationPublished by Association for Computing Machinery (ACM) ,1985
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976