Frustration Strategies: Formal Verification
暂无分享,去创建一个
Beyond the frustration capabilities gained by configuring conventional operating systems and services, it is possible to define a set of security controls that cannot be avoided by users of the computers involved, either authorized users or adversaries. These unavoidable controls are referred to as mandatory security, and are based on the concept of logical proofs of security. This chapter discusses these methods, and applies them to frustrate potential adversaries.
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[3] Hartmut Ehrig,et al. Introduction to Algebraic Specification. Part 1: Formal Methods for Software Development , 1992, Comput. J..