Abstract
A practical methodology for the verification of the protection mechanisms for high-level language machines is presented. It is argued that, although the methodology is informal, it does not lack precision—a feature not found in other informal verification attempts. The methodology has the advantage of ensuring both the correctness and the completeness of the protection mechanisms. The use of the methodology in the verification of systems similar to the Burroughs B6700/6800 is illustrated.
Similar content being viewed by others
References
D. E. Bell and L. J. La Padula,Secure Computer Systems: Mathematical Foundations and Model, Mitre Corp., Bedford, Massachusetts (1974).
Burroughs Corp.,B6700 Information Processing Systems-Reference Manual, Order Form No. 1058633, Detroit, Michigan (1972).
Burroughs Corp.,B6800 System Reference Manual, Order Form No. 5001290, Detroit, Michigan (1978).
J. J. Carnall and A. F. Wright, Secure communication processor-Hardware verification report, Honeywell Information Systems, Inc., Federal Systems Division, Technical Report, ARPA Order Number 3373, Program Code No. 7P10, prepared under contract NAVELEX N00039-77-C-0245 (1979).
E. Cohen and D. Jefferson, Protection in the HYDRA operating system, inProceedings 5th Symposium on Operating Systems Principles, Austin, Texas, pp. 141–160 (November 1975).
D. R. Ditzel and W. A. Kwinn, Reflections on a high-level language computer system or parting thoughts on the SYMBOL project, inProceeding International Workshop on High-Level Language Computer Architecture, Fort Lauderdale, Florida (May 1980).
D. R. Ditzel and D. A. Patterson, Retrospective on high-level language computer architecture, inProc. of 7th Annual Symposium on Computer Architecture, La Baule, France (May 1980), pp. 97–104.
R. J. Feiertag, K. N. Levitt, and L. Robinson, Proving multilevel security of a system design,S1GOPS 11(5):57–66 (November 1977).
V. D. Gligor, Analysis of the hardware verification of the Honeywell SCOMP, Technical Report No. TR-1308, University of Maryland (July 1983).
V. D. Gligor, Architectural aspects of abstract data type implementation, inProc. of 6th Annual Symposium on Computer Architecture, Philadelphia, Pennsylvania (May 1979.)
V. D. Gligor, Review and revocation of access privileges distributed through capabilities,IEEE Trans. Software Eng. SE-5(6):575–586 (November 1979).
S. Graham and P. Denning, Protection—Principles and practice, inProceedings AFIPS 1972 SJCC, Vol. 40, pp.417–429, AFIPS Press, Montvale, New Jersey.
Intel Corp.,iAPX 432—General Data Processor Architecture—Reference Manual, Order No. 171860-001, Aloha, Oregon (1981).
A. Jones and R. Lipton, The enforcement of security policies for computation, inProceedings of the 5th Symposium on Operating System Principles, Austin, Texas (November 1975).
K. C. Kahn, W. M. Corwin, T. D. Dennis, H. D'Hooge, D. E. Hubka, L. A. Hutchins, J. T. Montague, F. J. Pollack, and M. R. Gifkins, iMAX: A multiprocessor operating system for an object-based computer, inProceedings 8th Symposium on Operating System Principles, Pacific Grove, California (1981).
B. W. Lampson, Protection, inProceedings 5th Annual Princeton Conference, Princeton University, pp. 437–433 (March 1971).
B. W. Lampson, Redundancy and robustness in memory protection, inProceedings IFIP, North-Holland, Amsterdam, pp. 128–132 (1974).
E. J. McCauley and P. J. Drongowski, KSOS: The design of a secure operating system,in Proceedings AFIPS, NCC, Vol. 48, pp. 345–353 AFIPS Press, Arlington, Virginia (1979).
G. J. Myers,Advances in Computer Architecture, Wiley, New York (1978).
G. J. Myers, Storage concepts in a software-reliability-directed computer architecture,Proceedings of 5th Annual Symposium on Computer Architecture, New York (1978).
P. G. Neumann, R. S. Boyer, R. J. Feiertag, K. N. Levitt, and L. Robinson, A provably secure operating system: The system, its application, and proofs, SRI Project 4332, Final Report (February 1977).
E. I. Organick,Computer System Organization: The B5700/B6700 Series, Academic, New York (1973).
G. J. Popek and C. S. Kline, Issues in kernel design, inOperating Systems—An Advanced Course (R. Bayer, R. M. Graham, and G. Segmuller, eds.), Springer-Verlag, New York, pp. 210–226 (1978).
J. H. Saltzer and M. D. Schroeder, The protection of information in computer systems,Proc. IEEE 63:1278–1308 (September 1975).
M. D. Schroeder, Engineering a security kernel for MULTICS, inProceedings 5th Symposium on Operating Systems Principles, Austin, Texas, pp. 25–32 (November 1975).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Gligor, V.D. The verification of the protection mechanisms of high-level language machines. International Journal of Computer and Information Sciences 12, 211–246 (1983). https://doi.org/10.1007/BF00991620
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF00991620