A technique for software module specification with examples
Communications of the ACM
The structure of the “THE”-multiprogramming system
Communications of the ACM
Automatic program verification I: a logical basis and its implementation.
Automatic program verification I: a logical basis and its implementation.
Correctness in operating systems
Correctness in operating systems
Implications of a virtual memory mechanism for implementing protection in a family of operating systems
A design methodology for reliable software systems
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
Hi-index | 0.00 |
This paper describes an ongoing Air Force sponsored project at The MITRE Corporation to develop provably effective security (access) controls for computer systems. Because of the stringent requirements imposed by the need for algorithmic security control, an innovative software engineering technique was developed for the design and implementation of the security kernel, the software portion of the controls. This paper touches briefly on these controls and then describes in some detail the components of the software engineering technique and the methodology for proving the correctness of the system. An example, taken from the security kernel for a PDP-11/45 based system, is used to demonstrate the components and techniques used.