Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6) > Verification (D.4.6...)  
 
Options:
 
  1-5 of 5 Reviews about "Verification (D.4.6...)": Date Reviewed
  Model checking Petri nets with names using data-centric dynamic systems
Montali M., Rivkin A. Formal Aspects of Computing 28(4): 615-641, 2016.  Type: Article

Carl Adam Petri established Petri net theory, in 1962, with the publication of his doctoral thesis, “Kommunikation mit Automaten.” In the following 54 years, a rich and extensive body of work has been added to the t...

Mar 10 2017
   Formal verification of information flow security for a simple ARM-based separation kernel
Dam M., Guanciale R., Khakpour N., Nemati H., Schwarz O.  CCS 2013 (Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, Nov 4-8, 2013) 223-234, 2013.  Type: Proceedings

There has been considerable recent interest in verifying operating systems [1,2]. One of the difficulties with this form of software verification is simply stating the verification problem formally and succinctly. This, combined with t...

Jan 27 2014
  Digital system verification: a combined formal methods and simulation framework
Li L., Thornton M., Morgan and Claypool Publishers, San Rafael, CA, 2010. 100 pp.  Type: Book (978-1-608451-78-4)

Digital systems verification is a very important topic of research and industrial practice. Anecdotally, about 70 percent of silicon design efforts today go into validation/verification....

Oct 24 2011
  The Specification and Modeling of Computer Security
McLean J. Computer 23(1): 9-16, 1990.  Type: Article

The Bell and LaPadula definition of security for computer systems has been widely used for some years as the model followed in the National Computer Security Center’s evaluation process for trusted computer systems. This pape...

Oct 1 1990
  Muse--a computer assisted verification system
Halpern J., Owre S., Proctor N., Wilson W. IEEE Transactions on Software Engineering SE-13(2): 151-156, 1987.  Type: Article

The National Computer Security Center requires that for a computer system to achieve an A1 evaluation, one must show that the Formal Top Level Specification (FTLS) of the system satisfies the requirements of the security model the syst...

Dec 1 1987
 
 
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy