Proof techniques for hierarchically structured programs
Communications of the ACM
A model for verification of data security in operating systems
Communications of the ACM
Security Kernel validation in practice
Communications of the ACM
A note on the confinement problem
Communications of the ACM
The Euclid Language: a progress report
ACM '78 Proceedings of the 1978 annual conference
A comment on the confinement problem
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The Multics kernel design project
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Proving multilevel security of a system design
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Specification and verification of the UCLA Unix security kernel (Extended Abstract)
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
A verifiable protection system
Proceedings of the international conference on Reliable software
Report on the programming language Euclid
ACM SIGPLAN Notices
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Resiliency of the computerized society
AFIPS '83 Proceedings of the May 16-19, 1983, national computer conference
Private sector needs for trusted/secure computer systems
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
Hi-index | 0.00 |
The need to trust a computer system processing sensitive information has existed since the earliest uses of computers. As the effectiveness of computer systems has improved, the desire to utilize them in increasingly more important and consequently more sensitive information processing applications has grown rapidly. Sensitive information must be protected from unauthorized access or modification. But without trusted internal access control mechanisms, the computer has to be treated as a device operating at a single sensitivity level.