DocumentCode
3101045
Title
Applying a theory of modules and interfaces to security verification
Author
Lam, Simon S. ; Shankar, A. Udaya ; Woo, Thomas Y C
Author_Institution
Dept. of Comput. Sci., Texas Univ., Austin, TX, USA
fYear
1991
fDate
20-22 May 1991
Firstpage
136
Lastpage
154
Abstract
An overview is given of a theory of modules and interfaces applicable to the specification and verification of systems with a layered architecture. At the heart of this theory is a module composition theorem. The theory is applied to the specification of a distributed system consisting of subjects and objects in different hosts (computers). Formal specifications of a user interface and a network interface are given. Access to objects, both local and remote, offered by the distributed system is proved to be multilevel secure
Keywords
distributed processing; formal specification; program verification; security of data; user interfaces; distributed system; formal specification; layered architecture; module composition theorem; multilevel secure; network interface; security verification; user interface; Application software; Computer architecture; Computer science; Computer security; Distributed computing; Educational institutions; Formal specifications; Heart; Network interfaces; User interfaces;
fLanguage
English
Publisher
ieee
Conference_Titel
Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on
Conference_Location
Oakland, CA
Print_ISBN
0-8186-2168-0
Type
conf
DOI
10.1109/RISP.1991.130782
Filename
130782
Link To Document