A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems.
Xiaodong YiXuejun YangPublished in: ICICS (2003)
Keyphrases
- security policies
- information flow
- operating system
- mandatory access control
- verification method
- distributed systems
- access control
- security requirements
- multi threaded
- network security
- information security
- access control policies
- security management
- security mechanisms
- multilevel secure
- network management
- computer systems
- access control systems
- supply chain
- temporal logic
- model checking
- windows xp
- application level
- social networks
- virtual machine
- role based access control
- communication networks
- computer networks
- distributed environment
- smart card
- decision making
- computer security
- access control mechanism