Search
for Topics
All Reviews
Browse All Reviews
>
Software (D)
>
Operating Systems (D.4)
>
Security and Protection (D.4.6)
> Verification (D.4.6...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-5 of 5 Reviews about "
Verification (D.4.6...)
":
Date Reviewed
Model checking Petri nets with names using data-centric dynamic systems
Montali M., Rivkin A. Formal Aspects of Computing 28(4): 615-641, 2016. Type: Article
Carl Adam Petri established Petri net theory, in 1962, with the publication of his doctoral thesis, “Kommunikation mit Automaten.” In the following 54 years, a rich and extensive body of work has been added to the t...
Mar 10 2017
Formal verification of information flow security for a simple ARM-based separation kernel
Dam M., Guanciale R., Khakpour N., Nemati H., Schwarz O. CCS 2013 (Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, Nov 4-8, 2013) 223-234, 2013. Type: Proceedings
There has been considerable recent interest in verifying operating systems [1,2]. One of the difficulties with this form of software verification is simply stating the verification problem formally and succinctly. This, combined with t...
Jan 27 2014
Digital system verification: a combined formal methods and simulation framework
Li L., Thornton M., Morgan and Claypool Publishers, San Rafael, CA, 2010. 100 pp. Type: Book (978-1-608451-78-4)
Digital systems verification is a very important topic of research and industrial practice. Anecdotally, about 70 percent of silicon design efforts today go into validation/verification....
Oct 24 2011
The Specification and Modeling of Computer Security
McLean J. Computer 23(1): 9-16, 1990. Type: Article
The Bell and LaPadula definition of security for computer systems has been widely used for some years as the model followed in the National Computer Security Center’s evaluation process for trusted computer systems. This pape...
Oct 1 1990
Muse--a computer assisted verification system
Halpern J., Owre S., Proctor N., Wilson W. IEEE Transactions on Software Engineering SE-13(2): 151-156, 1987. Type: Article
The National Computer Security Center requires that for a computer system to achieve an A1 evaluation, one must show that the Formal Top Level Specification (FTLS) of the system satisfies the requirements of the security model the syst...
Dec 1 1987
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy