1981
DOI: 10.1145/356850.356852
|View full text |Cite
|
Sign up to set email alerts
|

Formal Models for Computer Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
122
0
9

Year Published

1987
1987
2009
2009

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 357 publications
(131 citation statements)
references
References 24 publications
0
122
0
9
Order By: Relevance
“…Nevertheless, there has been considerable discussion by researchers on formalizing software security models dating back to the 1980s [31]. In the past decade, especially with the advent of model checking technology [10], there have been advances in verifying security protocols [33,11] and proving security properties of applications [6,5,4].…”
Section: Formal Security Architecturesmentioning
confidence: 99%
“…Nevertheless, there has been considerable discussion by researchers on formalizing software security models dating back to the 1980s [31]. In the past decade, especially with the advent of model checking technology [10], there have been advances in verifying security protocols [33,11] and proving security properties of applications [6,5,4].…”
Section: Formal Security Architecturesmentioning
confidence: 99%
“…In the case of a politician, such infomation would be publicly available. The basic principle underlying MLS query answering is called simple security property and was de ned in the Bell-LaPadula model of mandatory security, see [Lan81]. It can also be described by the slogan \no read up", i.e.…”
Section: Mls Databasesmentioning
confidence: 99%
“…The Session system is 3 Note: in Z the application of function to argument can be written either as or as . The former is preferred; the latter can be used to improve clarity in complicated expressions.…”
Section: Sessionsmentioning
confidence: 99%