Affiliation:
1. Univ. of California, Los Angeles
Abstract
Program verification applied to kernel architectures forms a promising method for providing uncircumventably secure, shared computer systems. A precise definition of data security is developed here in terms of a general model for operating systems. This model is suitable as a basis for verifying many of those properties of an operating system which are necessary to assure reliable enforcement of security. The application of this approach to the UCLA secure operating system is also discussed.
Publisher
Association for Computing Machinery (ACM)
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cloud Computing Security Evaluation Based on Multidimensional Immune Algorithm (MIA);2023 3rd Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS);2023-02
2. CoCon: A Conference Management System with Formally Verified Document Confidentiality;Journal of Automated Reasoning;2020-07-16
3. Kernel Protection Against Just-In-Time Code Reuse;ACM Transactions on Privacy and Security;2019-01-23
4. kR^X;Proceedings of the Twelfth European Conference on Computer Systems;2017-04-23
5. The Nexus Between Cybercrime and Cyberterrorism;NATO SCI PEACE SEC;2017