1978
DOI: 10.1145/359588.359597
|View full text |Cite
|
Sign up to set email alerts
|

A model for verification of data security in operating systems

Abstract: Program verification applied to kernel architectures forms a promising method for providing uncircumventably secure, shared computer systems. A precise definition of data security is developed here in terms of a general model for operating systems. This model is suitable as a basis for verifying many of those properties of an operating system which are necessary to assure reliable enforcement of security. The application of this approach to the UCLA secure operating system is also discussed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

1978
1978
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 59 publications
(21 citation statements)
references
References 18 publications
0
21
0
Order By: Relevance
“…The top level specification described in figure-3 actually contains data security notion. This data security notion has been discussed by G. Popek and D. Farber [1]. The figure in right shows the consistency proofs between the levels.…”
Section: Project Implementationmentioning
confidence: 94%
See 2 more Smart Citations
“…The top level specification described in figure-3 actually contains data security notion. This data security notion has been discussed by G. Popek and D. Farber [1]. The figure in right shows the consistency proofs between the levels.…”
Section: Project Implementationmentioning
confidence: 94%
“…The verification of UCLA system is based on data security model provided by G. Popek and D. Farber [1]. The data security model can be used to verify many of those properties in an operating system which are necessary to ensure reliable security enforcement.…”
Section: Ucla Projectmentioning
confidence: 99%
See 1 more Smart Citation
“…• Security kernel and trusted computing base (TCB): A security kernel [Popek and Farber 1978] refers to a small core of hardware and software components that are responsible for enforcing security policies of a system 1 . A TCB [Lampson et al 1992] generalizes on this concept to include, as part of the trusted components, software processes that may reside outside the kernel; consequently, a TCB can also be used to check end-to-end security properties that extend beyond the kernel boundary.…”
Section: Known Usesmentioning
confidence: 99%
“…Concepts such as the trusted computing base [Lampson et al 1992], security kernel [Popek and Farber 1978], and safety kernel [Rushby 1989] are well known in the fields of security and safety-critical systems. We believe that experienced designers already do this, structuring a system so that the most critical components are kept to small subsets of the system's parts.…”
Section: Introductionmentioning
confidence: 99%