Proof of separability A verification technique for a class of security kernels
- 1 January 1982
- book chapter
- Published by Springer Nature
- p. 352-367
- https://doi.org/10.1007/3-540-11494-7_23
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- A penetration analysis of a Burroughs Large SystemACM SIGOPS Operating Systems Review, 1981
- Design and verification of secure systemsPublished by Association for Computing Machinery (ACM) ,1981
- A Technique for Proving Specifications are Multilevel SecurePublished by Defense Technical Information Center (DTIC) ,1980
- A penetration analysis of the Michigan Terminal SystemACM SIGOPS Operating Systems Review, 1980
- A model for verification of data security in operating systemsCommunications of the ACM, 1978
- Proving multilevel security of a system designPublished by Association for Computing Machinery (ACM) ,1977
- Security Kernel validation in practiceCommunications of the ACM, 1976
- Penetrating an operating system: a study of VM/370 integrityIBM Systems Journal, 1976
- A note on the confinement problemCommunications of the ACM, 1973
- Computer Security Technology Planning Study. Volume 2Published by Defense Technical Information Center (DTIC) ,1972