Map
Index
Random
Help
th

QuoteRef: robiL9_1975

topics > all references > ThesaHelp: references p-r



Topic:
decomposition of a system into levels
Topic:
virtual machine
Topic:
security by capabilities
Group:
exception handling
Topic:
program proof via assertions
Topic:
words defined by words
ThesaHelp:
references p-r
Topic:
security by access functions
Topic:
data type by access rights
Topic:
requirement specification by assertion
Topic:
security by access rights
Topic:
security leaks and weaknesses

Reference

Robinson, L., Levitt, K.N., Neumann, P.G., Saxena, A.R., "A formal methodology for the design of operating system software", Menlo Park, California, Stanford Research Institute, Computer Science Group, September 1975. Google

Quotations
QuoteRef: robiL9_1975 ;;2 levels of abstract machines which only access one level away. Level either transparent to feature or hides feature
2 ;;Quote: define modules by assertions about state information and state changes; include exception conditions
QuoteRef: robiL9_1975 ;;2 exception conditions have no effect on module
QuoteRef: robiL9_1975 ;;3 global assertions - true at initial state and any sequence of operations afterwards
QuoteRef: robiL9_1975 ;;3 mapping function expression-- specify v function by v functions of lower machine
4 ;;Quote: users should have restricted access that is independent of other users
5 ;;Quote: a secure kernel still may prevent access due to poor scheduling, or communicate implementation via behavior under load
5 ;;Quote: each operating system level manages a particular type of abstract object
QuoteRef: robiL9_1975 ;;6 rights to object only if created by legitimately given rights
QuoteRef: robiL9_1975 ;;6 can create a capability, same or new id, with same or fewer operations
QuoteRef: robiL9_1975 ;;9 derived value access generated from underived values (no initialization) for access protection in operating system


Related Topics up

Topic: decomposition of a system into levels (49 items)
Topic: virtual machine (13 items)
Topic: security by capabilities (65 items)
Group: exception handling   (12 topics, 305 quotes)
Topic: program proof via assertions (61 items)
Topic: words defined by words (24 items)
ThesaHelp: references p-r (245 items)
Topic: security by access functions (10 items)
Topic: data type by access rights (20 items)
Topic: requirement specification by assertion (28 items)
Topic: security by access rights (36 items)
Topic: security leaks and weaknesses (56 items)

Collected barberCB 1980
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.