DocumentCode :
3101045
Title :
Applying a theory of modules and interfaces to security verification
Author :
Lam, Simon S. ; Shankar, A. Udaya ; Woo, Thomas Y C
Author_Institution :
Dept. of Comput. Sci., Texas Univ., Austin, TX, USA
fYear :
1991
fDate :
20-22 May 1991
Firstpage :
136
Lastpage :
154
Abstract :
An overview is given of a theory of modules and interfaces applicable to the specification and verification of systems with a layered architecture. At the heart of this theory is a module composition theorem. The theory is applied to the specification of a distributed system consisting of subjects and objects in different hosts (computers). Formal specifications of a user interface and a network interface are given. Access to objects, both local and remote, offered by the distributed system is proved to be multilevel secure
Keywords :
distributed processing; formal specification; program verification; security of data; user interfaces; distributed system; formal specification; layered architecture; module composition theorem; multilevel secure; network interface; security verification; user interface; Application software; Computer architecture; Computer science; Computer security; Distributed computing; Educational institutions; Formal specifications; Heart; Network interfaces; User interfaces;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-2168-0
Type :
conf
DOI :
10.1109/RISP.1991.130782
Filename :
130782
Link To Document :
بازگشت