Verifying Security.

Autor: Cheheyl, Maureen Harris, Gasser, Morrie, Huff, George A., Millen, Jonathan K.
Předmět:
Zdroj: ACM Computing Surveys; Sep81, Vol. 13 Issue 3, p279-339, 61p
Abstrakt: Four automated specification and verification environments are surveyed and compared: HDM, FDM, Gypsy, and AFFIRM. The emphasis of the comparison is on the way these systems could be used to prove security properties of an operating system design. [ABSTRACT FROM AUTHOR]
Databáze: Complementary Index