The Vienna Definition Language
ACM Computing Surveys (CSUR)
An Assessment of Techniques for Proving Program Correctness
ACM Computing Surveys (CSUR)
Security Kernel validation in practice
Communications of the ACM
An axiomatic basis for computer programming
Communications of the ACM
Minicomputer Systems: Organization, Programming and Applications (PDP-11)
Minicomputer Systems: Organization, Programming and Applications (PDP-11)
Operating Systems, An Advanced Course
A verifiable protection system
Proceedings of the international conference on Reliable software
An interactive program verification system
Proceedings of the international conference on Reliable software
An algebraic definition of simulation between programs
An algebraic definition of simulation between programs
Contributions to compiler correctness.
Contributions to compiler correctness.
A security model for military message systems
ACM Transactions on Computer Systems (TOCS)
Kit: A Study in Operating System Verification
IEEE Transactions on Software Engineering
A Model for Multilevel Security in Computer Networks
IEEE Transactions on Software Engineering
MULTISAFE—a modular multiprocessing approach to secure database management
ACM Transactions on Database Systems (TODS)
Space saving key-lock access control system (abstract only)
CSC '87 Proceedings of the 15th annual conference on Computer Science
ACM Computing Surveys (CSUR)
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
An Axiomatic Approach to Information Flow in Programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
Parallel programs: proofs, principles, and practice
Communications of the ACM
Specification and verification of the UCLA Unix security kernel
Communications of the ACM
A language extension for expressing constraints on data access
Communications of the ACM
Certifying information flow properties of programs: an axiomatic approach
POPL '79 Proceedings of the 6th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Design and verification of secure systems
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
Reflections on the verification of the security of an operating system kernel
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
Some lessons from formalizing a security model
ACM SIGSOFT Software Engineering Notes - Proceedings of VERkshop III -- a formal verification workshop
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
The advent of trusted computer operating systems
AFIPS '80 Proceedings of the May 19-22, 1980, national computer conference
Concerning "Modeling" of computer security
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Patterns for building dependable systems with trusted bases
Proceedings of the 17th Conference on Pattern Languages of Programs
Hi-index | 48.27 |
Program verification applied to kernel architectures forms a promising method for providing uncircumventably secure, shared computer systems. A precise definition of data security is developed here in terms of a general model for operating systems. This model is suitable as a basis for verifying many of those properties of an operating system which are necessary to assure reliable enforcement of security. The application of this approach to the UCLA secure operating system is also discussed.