• DocumentCode
    2562790
  • Title

    Information Flow and Invariance

  • Author

    Guttman, Joshua

  • fYear
    1987
  • fDate
    27-29 April 1987
  • Firstpage
    67
  • Lastpage
    67
  • Abstract
    A flaw in an operating system that had apparently been verified using the information flow technique indicates that the approach, as it has been practiced, is incomplete, The software tool that was used requires specifications to have a format prone to cause errors, so that a modification of the design of the tool is needed, Moreover, the verification process was logically incomplete, because flow analysis of a version of the specification free of errors yields formulas that can be proved only via invariant properties. This observation leads to an integration of two techniques for verifying security.
  • Keywords
    Abstracts; Formal verification; Kernel; Security; Sensitivity; Wires;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy, 1987 IEEE Symposium on
  • Conference_Location
    Oakland, CA, USA
  • ISSN
    1540-7993
  • Print_ISBN
    0-8186-0771-8
  • Type

    conf

  • DOI
    10.1109/SP.1987.10022
  • Filename
    6234877