DocumentCode
2561365
Title
Executable Logic Specifications: A New Approach
Author
Sidhu, Deepinder P.
Author_Institution
SDC -A Burroughs Company
fYear
1984
fDate
April 29 1984-May 2 1984
Firstpage
142
Lastpage
142
Abstract
This paper discusses the use of logic programming techniques in the specification and verification of secure systems. The secure systems specifications discussed are formal and directly executable. The advantages of executable specifications are: (1) the specification is itself a prototype of the specified system, (2) incremental development of specification sis possible, (3)behavior exhibited by the specification when executed can be used to check conformity of the specification with security requirements such as DoD security policy, or discretionary and integrity policies.We discuss Horn clause logic, which has a procedural interpretation, and we use the predicate logic programming language, PROLOG, to specify and verify the functional correctness of secure systems, The PROLOG system possesses a powerful pattern-matching feature which is based on unification. An executable specification is very useful in checking completeness of a design and rectifying flaws in it before the expensive step of coding starts. In this paper, three examples of executable logic specifications are given a "login" command from military message system experiment, a security kernel for an imaginary computer architecture, and a simple downgrade trusted process. Executable logic specifications for secure systems could prove very useful to the DoD Computer Security Center in assessing computer products according to trusted computer system evaluation criteria.
Keywords
Computer security; Computers; Kernel; Logic programming; Prototypes; US Department of Defense;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 1984 IEEE Symposium on
Conference_Location
Oakland, CA, USA
ISSN
1540-7993
Print_ISBN
0-8186-0532-4
Type
conf
DOI
10.1109/SP.1984.10020
Filename
6234793
Link To Document