Skip to main content
Log in

The verification of the protection mechanisms of high-level language machines

  • Published:
International Journal of Computer & Information Sciences Aims and scope Submit manuscript

Abstract

A practical methodology for the verification of the protection mechanisms for high-level language machines is presented. It is argued that, although the methodology is informal, it does not lack precision—a feature not found in other informal verification attempts. The methodology has the advantage of ensuring both the correctness and the completeness of the protection mechanisms. The use of the methodology in the verification of systems similar to the Burroughs B6700/6800 is illustrated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. D. E. Bell and L. J. La Padula,Secure Computer Systems: Mathematical Foundations and Model, Mitre Corp., Bedford, Massachusetts (1974).

    Google Scholar 

  2. Burroughs Corp.,B6700 Information Processing Systems-Reference Manual, Order Form No. 1058633, Detroit, Michigan (1972).

  3. Burroughs Corp.,B6800 System Reference Manual, Order Form No. 5001290, Detroit, Michigan (1978).

  4. J. J. Carnall and A. F. Wright, Secure communication processor-Hardware verification report, Honeywell Information Systems, Inc., Federal Systems Division, Technical Report, ARPA Order Number 3373, Program Code No. 7P10, prepared under contract NAVELEX N00039-77-C-0245 (1979).

  5. E. Cohen and D. Jefferson, Protection in the HYDRA operating system, inProceedings 5th Symposium on Operating Systems Principles, Austin, Texas, pp. 141–160 (November 1975).

  6. D. R. Ditzel and W. A. Kwinn, Reflections on a high-level language computer system or parting thoughts on the SYMBOL project, inProceeding International Workshop on High-Level Language Computer Architecture, Fort Lauderdale, Florida (May 1980).

  7. D. R. Ditzel and D. A. Patterson, Retrospective on high-level language computer architecture, inProc. of 7th Annual Symposium on Computer Architecture, La Baule, France (May 1980), pp. 97–104.

  8. R. J. Feiertag, K. N. Levitt, and L. Robinson, Proving multilevel security of a system design,S1GOPS 11(5):57–66 (November 1977).

    Google Scholar 

  9. V. D. Gligor, Analysis of the hardware verification of the Honeywell SCOMP, Technical Report No. TR-1308, University of Maryland (July 1983).

  10. V. D. Gligor, Architectural aspects of abstract data type implementation, inProc. of 6th Annual Symposium on Computer Architecture, Philadelphia, Pennsylvania (May 1979.)

  11. V. D. Gligor, Review and revocation of access privileges distributed through capabilities,IEEE Trans. Software Eng. SE-5(6):575–586 (November 1979).

    Google Scholar 

  12. S. Graham and P. Denning, Protection—Principles and practice, inProceedings AFIPS 1972 SJCC, Vol. 40, pp.417–429, AFIPS Press, Montvale, New Jersey.

  13. Intel Corp.,iAPX 432—General Data Processor Architecture—Reference Manual, Order No. 171860-001, Aloha, Oregon (1981).

  14. A. Jones and R. Lipton, The enforcement of security policies for computation, inProceedings of the 5th Symposium on Operating System Principles, Austin, Texas (November 1975).

  15. K. C. Kahn, W. M. Corwin, T. D. Dennis, H. D'Hooge, D. E. Hubka, L. A. Hutchins, J. T. Montague, F. J. Pollack, and M. R. Gifkins, iMAX: A multiprocessor operating system for an object-based computer, inProceedings 8th Symposium on Operating System Principles, Pacific Grove, California (1981).

  16. B. W. Lampson, Protection, inProceedings 5th Annual Princeton Conference, Princeton University, pp. 437–433 (March 1971).

  17. B. W. Lampson, Redundancy and robustness in memory protection, inProceedings IFIP, North-Holland, Amsterdam, pp. 128–132 (1974).

    Google Scholar 

  18. E. J. McCauley and P. J. Drongowski, KSOS: The design of a secure operating system,in Proceedings AFIPS, NCC, Vol. 48, pp. 345–353 AFIPS Press, Arlington, Virginia (1979).

    Google Scholar 

  19. G. J. Myers,Advances in Computer Architecture, Wiley, New York (1978).

    Google Scholar 

  20. G. J. Myers, Storage concepts in a software-reliability-directed computer architecture,Proceedings of 5th Annual Symposium on Computer Architecture, New York (1978).

  21. P. G. Neumann, R. S. Boyer, R. J. Feiertag, K. N. Levitt, and L. Robinson, A provably secure operating system: The system, its application, and proofs, SRI Project 4332, Final Report (February 1977).

  22. E. I. Organick,Computer System Organization: The B5700/B6700 Series, Academic, New York (1973).

    Google Scholar 

  23. G. J. Popek and C. S. Kline, Issues in kernel design, inOperating Systems—An Advanced Course (R. Bayer, R. M. Graham, and G. Segmuller, eds.), Springer-Verlag, New York, pp. 210–226 (1978).

    Google Scholar 

  24. J. H. Saltzer and M. D. Schroeder, The protection of information in computer systems,Proc. IEEE 63:1278–1308 (September 1975).

    Google Scholar 

  25. M. D. Schroeder, Engineering a security kernel for MULTICS, inProceedings 5th Symposium on Operating Systems Principles, Austin, Texas, pp. 25–32 (November 1975).

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gligor, V.D. The verification of the protection mechanisms of high-level language machines. International Journal of Computer and Information Sciences 12, 211–246 (1983). https://doi.org/10.1007/BF00991620

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF00991620

Key words