• DocumentCode
    3101045
  • Title

    Applying a theory of modules and interfaces to security verification

  • Author

    Lam, Simon S. ; Shankar, A. Udaya ; Woo, Thomas Y C

  • Author_Institution
    Dept. of Comput. Sci., Texas Univ., Austin, TX, USA
  • fYear
    1991
  • fDate
    20-22 May 1991
  • Firstpage
    136
  • Lastpage
    154
  • Abstract
    An overview is given of a theory of modules and interfaces applicable to the specification and verification of systems with a layered architecture. At the heart of this theory is a module composition theorem. The theory is applied to the specification of a distributed system consisting of subjects and objects in different hosts (computers). Formal specifications of a user interface and a network interface are given. Access to objects, both local and remote, offered by the distributed system is proved to be multilevel secure
  • Keywords
    distributed processing; formal specification; program verification; security of data; user interfaces; distributed system; formal specification; layered architecture; module composition theorem; multilevel secure; network interface; security verification; user interface; Application software; Computer architecture; Computer science; Computer security; Distributed computing; Educational institutions; Formal specifications; Heart; Network interfaces; User interfaces;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on
  • Conference_Location
    Oakland, CA
  • Print_ISBN
    0-8186-2168-0
  • Type

    conf

  • DOI
    10.1109/RISP.1991.130782
  • Filename
    130782