High level specification of non-interference security policies in partitioned MLS systems
暂无分享,去创建一个
[1] Myla Archer,et al. Formal specification and verification of data separation in a separation kernel for an embedded system , 2006, CCS '06.
[2] Jim Alves-Foss,et al. The MILS architecture for high-assurance embedded systems , 2006, Int. J. Embed. Syst..
[3] Ira S. Moskowitz,et al. The Pump: a decade of covert fun , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[4] John Rushby,et al. Noninterference, Transitivity, and Channel-Control Security Policies 1 , 2005 .
[5] Richard A. Kemmerer,et al. A practical approach to identifying storage and timing channels: twenty years later , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[6] Steve A. Schneider,et al. Concurrent and Real-time Systems: The CSP Approach , 1999 .
[7] B. L. Di Vito,et al. A model of cooperative noninterference for integrated modular avionics , 1999 .
[8] V. Stavridou,et al. A model of noninterference for integrating mixed-criticality software components , 1999, Dependable Computing for Critical Applications 7.
[9] E. Stewart Lee,et al. A general theory of security properties , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[10] Ira S. Moskowitz,et al. A Network Pump , 1996, IEEE Trans. Software Eng..
[11] John McLean,et al. A general theory of composition for trace sets closed under selective interleaving functions , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[12] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[13] John M. Rushby,et al. Proof of separability: A verification technique for a class of a security kernels , 1982, Symposium on Programming.
[14] John M. Rushby,et al. Design and verification of secure systems , 1981, SOSP.