DocumentCode
2562790
Title
Information Flow and Invariance
Author
Guttman, Joshua
fYear
1987
fDate
27-29 April 1987
Firstpage
67
Lastpage
67
Abstract
A flaw in an operating system that had apparently been verified using the information flow technique indicates that the approach, as it has been practiced, is incomplete, The software tool that was used requires specifications to have a format prone to cause errors, so that a modification of the design of the tool is needed, Moreover, the verification process was logically incomplete, because flow analysis of a version of the specification free of errors yields formulas that can be proved only via invariant properties. This observation leads to an integration of two techniques for verifying security.
Keywords
Abstracts; Formal verification; Kernel; Security; Sensitivity; Wires;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 1987 IEEE Symposium on
Conference_Location
Oakland, CA, USA
ISSN
1540-7993
Print_ISBN
0-8186-0771-8
Type
conf
DOI
10.1109/SP.1987.10022
Filename
6234877
Link To Document