skip to main content
article
Free access

Some lessons from formalizing a security model

Published: 01 August 1985 Publication History

Abstract

No abstract available.

References

[1]
Corn84 Cornwell, M., and Jacob, R. J. K., Structure of a rapid prototype Secure Military Message System. Proc. 7th DoD/NBS Computer Security Conference, Gaithersburg, MD, 24--26 Sept. 1984.
[2]
Heit82 Heitmeyer, C. L., Landwehr, C. E., and Cornwell, M., "The use of quick prototypes in the Secure Military Message Systems project," Proc. ACM SIGSOFT Second Software Engineering Symposium: Workshop on Rapid Prototyping, April, 1982, Columbia, MD. Reprinted in ACM SIGSOFT Software Engineering Notes, Vol. 7, No. 5 (Dec. 1982) pp. 85--87.
[3]
Land80 Landwehr, C. E. Assocations for verification of multi-level secure military message systems. Workshop on Formal Verification, SRI, Menlo Park, CA, April 1980. Reprinted in ACM SIGSOFT Software Engineering Notes, Vol. 5, No. 3 (July 1980) pp. 46--47.
[4]
Land84 Landwehr, C. E., Heitmeyer, C. L., and McLean, J., A Security Model for Military Message Systems. ACM Trans. on Computer Systems, Vol. 2, No. 3, (August 1984) pp. 198--222.
[5]
Pope78 Popek, G. J., and D. A. Farber. A model for verification of data security in operating systems. CACM 21, 9 (Sept. 1978) pp. 737--749.

Cited By

View all
  • (1994)An experience modeling critical requirementsProceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance10.1109/CMPASS.1994.318448(245-255)Online publication date: 1994
  • (1991)A separation model for virtual machine monitorsProceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy10.1109/RISP.1991.130776(78-86)Online publication date: 1991
  • (1990)On models for a trusted application system[1990] Proceedings of the Sixth Annual Computer Security Applications Conference10.1109/CSAC.1990.143752(58-67)Online publication date: 1990

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 10, Issue 4
Proceedings of VERkshop III -- a formal verification workshop
August 1985
135 pages
ISSN:0163-5948
DOI:10.1145/1012497
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 1985
Published in SIGSOFT Volume 10, Issue 4

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)42
  • Downloads (Last 6 weeks)7
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (1994)An experience modeling critical requirementsProceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance10.1109/CMPASS.1994.318448(245-255)Online publication date: 1994
  • (1991)A separation model for virtual machine monitorsProceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy10.1109/RISP.1991.130776(78-86)Online publication date: 1991
  • (1990)On models for a trusted application system[1990] Proceedings of the Sixth Annual Computer Security Applications Conference10.1109/CSAC.1990.143752(58-67)Online publication date: 1990

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media