Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Muse--a computer assisted verification system
Halpern J., Owre S., Proctor N., Wilson W. IEEE Transactions on Software EngineeringSE-13 (2):151-156,1987.Type:Article
Date Reviewed: Dec 1 1987

The National Computer Security Center requires that for a computer system to achieve an A1 evaluation, one must show that the Formal Top Level Specification (FTLS) of the system satisfies the requirements of the security model the system is intended to maintain. HDM, along with its accompanying specification language, SPECIAL, is a software tool designed to help software developers meet this requirement. A limitation of HDM is that it supports only one security model. This paper describes the software tool Muse, which makes HDM more flexible by permitting the user to define a security model in SPECIAL and then to prove that the FTLS maintains the model.

The enhancement consists of a parser, a linker, a formula generator, and a theorem prover--the latter two components being the most interesting. Of particular note is the discussion of the reliability of the theorem prover. Compared to the amount of work being done on building programs to verify other programs, there is very little work taking place on the issue of why we should trust one program simply on the word of another program. Any effort made to assure that the latter is correct could be, perhaps, better spent on the former. The authors address the issue head on, saying that software bugs are eliminated through repeated use of a stable system. Hence, the system’s proof checker will be required to remain stable, while heuristic proof-finding facilities may change over time.

Reviewer:  J. D. McLean Review #: CR111783
Bookmark and Share
 
Verification (D.4.6 ... )
 
 
Mechanical Theorem Proving (F.4.1 ... )
 
 
Deduction And Theorem Proving (I.2.3 )
 
 
Specifying And Verifying And Reasoning About Programs (F.3.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Verification": Date
The Specification and Modeling of Computer Security
McLean J. Computer 23(1): 9-16, 1990. Type: Article
Oct 1 1990
Digital system verification: a combined formal methods and simulation framework
Li L., Thornton M., Morgan and Claypool Publishers, San Rafael, CA, 2010.  100, Type: Book (978-1-608451-78-4)
Oct 24 2011
 Formal verification of information flow security for a simple ARM-based separation kernel
Dam M., Guanciale R., Khakpour N., Nemati H., Schwarz O.  CCS 2013 (Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, Nov 4-8, 2013)223-234, 2013. Type: Proceedings
Jan 27 2014
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy