A technique for software module specification with examples
Communications of the ACM
A note on the confinement problem
Communications of the ACM
On attaining reliable software for a secure operating system
Proceedings of the international conference on Reliable software
Implications of a virtual memory mechanism for implementing protection in a family of operating systems
On the Identification of Covert Storage Channels in Secure Systems
IEEE Transactions on Software Engineering
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels
IEEE Transactions on Software Engineering
MULTISAFE—a modular multiprocessing approach to secure database management
ACM Transactions on Database Systems (TODS)
An Application of Formal Analysis to Software in a Fault-Tolerant Environment
IEEE Transactions on Computers
ACM Computing Surveys (CSUR)
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
An Axiomatic Approach to Information Flow in Programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
Shared resource matrix methodology: an approach to identifying storage and timing channels
ACM Transactions on Computer Systems (TOCS)
A model for verification of data security in operating systems
Communications of the ACM
Certification of programs for secure information flow
Communications of the ACM
Protecting privacy using the decentralized label model
ACM Transactions on Software Engineering and Methodology (TOSEM)
Untrusted hosts and confidentiality: secure program partitioning
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
ACM Transactions on Computer Systems (TOCS)
Certifying information flow properties of programs: an axiomatic approach
POPL '79 Proceedings of the 6th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military
IEEE Annals of the History of Computing
Survey of recent operating systems research, designs and implementations
ACM SIGOPS Operating Systems Review
Some security principles and their application to computer security
ACM SIGOPS Operating Systems Review
Proceedings of the 25th International Conference on Software Engineering
SIGSOFT tutorial on program verification (Tutorial Session)
ACM '76 Proceedings of the 1976 annual conference
Proving multilevel security of a system design
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Information transmission in computational systems
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Design and verification of secure systems
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
Software development and proofs of multi-level security
ICSE '76 Proceedings of the 2nd international conference on Software engineering
Using Replication and Partitioning to Build Secure Distributed Systems
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Data base management systems security and INGRES
VLDB '79 Proceedings of the fifth international conference on Very Large Data Bases - Volume 5
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
The advent of trusted computer operating systems
AFIPS '80 Proceedings of the May 19-22, 1980, national computer conference
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Data base security: requirements, policies, and models
IBM Systems Journal
Security considerations for personal computers
IBM Systems Journal
An overview of computer security
IBM Systems Journal
Hi-index | 48.25 |
A security kernel is a software and hardware mechanism that enforces access controls within a computer system. The correctness of a security kernel on a PDP-11/45 is being proved. This paper describes the technique used to carry out the first step of the proof: validating a formal specification of the program with respect to axioms for a secure system.