Topic: decomposition of a system into levels
Topic: virtual machine
Topic: security by capabilities
Group: exception handling
Topic: program proof via assertions
Topic: words defined by words
ThesaHelp: references p-r
Topic: security by access functions
Topic: data type by access rights
Topic: requirement specification by assertion
Topic: security by access rights
Topic: security leaks and weaknesses
| |
Reference
Robinson, L., Levitt, K.N., Neumann, P.G., Saxena, A.R.,
"A formal methodology for the design of operating system software", Menlo Park, California, Stanford Research Institute, Computer Science Group, September 1975.
Google
Quotations
QuoteRef: robiL9_1975 ;;2 levels of abstract machines which only access one level away. Level either transparent to feature or hides feature
| 2 ;;Quote: define modules by assertions about state information and state changes; include exception conditions
| QuoteRef: robiL9_1975 ;;2 exception conditions have no effect on module
| QuoteRef: robiL9_1975 ;;3 global assertions - true at initial state and any sequence of operations afterwards
| QuoteRef: robiL9_1975 ;;3 mapping function expression-- specify v function by v functions of lower machine
| 4 ;;Quote: users should have restricted access that is independent of other users
| 5 ;;Quote: a secure kernel still may prevent access due to poor scheduling, or communicate implementation via behavior under load
| 5 ;;Quote: each operating system level manages a particular type of abstract object
| QuoteRef: robiL9_1975 ;;6 rights to object only if created by legitimately given rights
| QuoteRef: robiL9_1975 ;;6 can create a capability, same or new id, with same or fewer operations
| QuoteRef: robiL9_1975 ;;9 derived value access generated from underived values (no initialization) for access protection in operating system
|
Related Topics
Topic: decomposition of a system into levels (49 items)
Topic: virtual machine (13 items)
Topic: security by capabilities (65 items)
Group: exception handling (12 topics, 305 quotes)
Topic: program proof via assertions (61 items)
Topic: words defined by words (24 items)
ThesaHelp: references p-r (245 items)
Topic: security by access functions (10 items)
Topic: data type by access rights (20 items)
Topic: requirement specification by assertion (28 items)
Topic: security by access rights (36 items)
Topic: security leaks and weaknesses (56 items)
|