Skip to main content

Bestimmung der Sicherheit durch formale Ansätze

  • Chapter
  • First Online:
  • 2974 Accesses

Part of the book series: Xpert.press ((XPERT.PRESS))

This is a preview of subscription content, log in via an institution.

Buying options

eBook
USD   19.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Bleyh, Modellierung operationaler Aspekte von Systemarchitekturen, Diplomarbeit an der Hochschule der Medien 2006, Präsentation downloadbar unter http://www.kriha.de/krihaorg/dload/bleyh.pdf

    Google Scholar 

  2. M. Bishop, Computer Security – Art and Science, MacMillan Technical Publishing 2002

    Google Scholar 

  3. W.E. Boebert, On the Inability of an Unmodified Capability Machine to Enforce the *-Property, 7th DOD/NBS Computer Security Conference, 1984, http://zesty.ca/capmyths/boebert.html

    Google Scholar 

  4. H. Gallaire, J. Minker (eds), Logic and Data Bases. Perseus Publishing, 1978, 0.1.3

    Google Scholar 

  5. N. Hardy, The confused deputy: (or why capabilities might have been invented), SIGOPS Oper. Syst. Rev. 22(4), (1988), 36–38

    Article  Google Scholar 

  6. G. Heiser, The Role of Virtualization in Embedded Systems, 1st Workshop on Isolation and Integration in Embedded Systems, Glasgow, UK, April, 2008, http://www.ertos.nicta.com.au/publications/papers/Heiser_08.pdf

    Google Scholar 

  7. G. Heiser, K. Elphinstone, I. Kuz, G. Klein, S.M. Petters, Towards Trustworthy Computing Systems: Taking Microkernels to the Next Level. ACM Operating Systems Review, 41(4), (July, 2007), 3–11, http://ertos.nicta.com.au/publications/papers/Heiser_EKKP_07.pdf

    Google Scholar 

  8. M. Hafner, R. Mair, R. Breu, B. Agreiter, S. Unterthiner, T. Schabetsberger, HEALTH@NET – Die Verteilte Elektronische Gesundheitsakte. Eine Fallstudie in Modell-Getriebenem Security Engineering. In: Innovationsmotor IT-Sicherheit, Tagungsband zum 10. Deutschen IT-Sicherheitskongress, BSI Bonn, 2007

    Google Scholar 

  9. R.J. Hansen, M.L. Patterson: Guns and Butter: Towards Formal Axioms of Input Validation, http://www.blackhat.com/presentations/bh-usa-05/BH_US_05-Hansen-Patterson/HP2005.pdf

    Google Scholar 

  10. M. Harrison, W. Ruzzo, J. Ullman, Protection in Operating Systems, Communications of the ACM 19 (8), (1976), 461-471

    Article  MATH  MathSciNet  Google Scholar 

  11. J. Jürjens, Secure Systems Development with UML, Springer 2005

    Google Scholar 

  12. B.W. Lampson: A note on the confinement problem. Commun. ACM 16(10) (1973) 613–615

    Article  Google Scholar 

  13. M.S. Miller, J. Shapiro, Paradigm Regained: Abstraction Mechanisms for Access Control. In: 8th Asian Computing Science Conference (ASIAN03), (December 2003) 224–242

    Google Scholar 

  14. M.S.Miller, M.Stiegler, T.Close, B.Frantz, K.P.Yee, C. Morningstar, J.Shapiro, N.Hardy, Tribble, E.D., Barnes, D., Bornstien, D., Wilcox-O’Hearn, B., Stanley, T., Reid, K., Bacon, D.: E: Open source distributed capabilities (2001) Available at http://www.erights.org.

    Google Scholar 

  15. J. H. Saltzer, M.D. Schroeder, The Protection of Information in Computer Systems, 1973, online verfügbar unter http://www.cs.virginia.edu/∼evans/cs551/saltzer/

    Google Scholar 

  16. M. Schmidt, Host Intrusion Detection Systeme, Diplomarbeit an der Hochschule der Medien, 2007, Kapitel 4: Ausnutzen mehrfachen Encodings

    Google Scholar 

  17. J. Shapiro, The Practical Application of a Decidable Access Model. SRL Technical Report SRL 2000-01, Johns Hopkins University, http://srl.cs.jhu.edu/pubs/SRL2003-04.pdf

    Google Scholar 

  18. F. Spiessens, M. Miller, P. Van Roy, J. Shapiro, Authority Reduction in Protection Systems. http://www.info.ucl.ac.be/∼fsp/ARS.pdf, 2004

    Google Scholar 

  19. F. Spiessens, Patterns of Safe Collaboration. PhD thesis, Université catholique de Louvain, Louvainla-Neuve, Belgium (February 2007)

    Google Scholar 

  20. S. Strobel, Applikationssicherheit – mehr als Härten und Patchen von Syste-men, http://www.cirosec.de/deutsch/presse/veroeffentlichungen/ Applikationsssicherheit.html

    Google Scholar 

  21. http://www.technicalinfo.net/papers/CSS.html

    Google Scholar 

  22. M. V. Tripunitara, N. Li, The Foundational Work of Harrison-Ruzzo-Ullmann Revisited, Dept. of Computer Science, Purdue University

    Google Scholar 

  23. P. van Roy, F. Spiessens, A Practical Formal Model for Safety Analysis in Capability Based Systems, In: TGC 2005, Volume 3705 of Lecture Notes in Computer Science, Springer-Verlag 2005, 248–278

    Google Scholar 

  24. P. van Roy, S. Haridi, Concepts, Techniques and Models of Computer Programming, 2004, MIT Press

    Google Scholar 

  25. D.S.Wallach, D. Balfanz, D.Dean, E.W. Felten.: Extensible security architectures for java. In: Proceedings of the sixteenth ACM symposium on Operating systems principles, ACM Press (1997) 116–128

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walter Kriha .

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schmitz, R., Kriha, W. (2009). Bestimmung der Sicherheit durch formale Ansätze. In: Sichere Systeme. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78959-8_14

Download citation

Publish with us

Policies and ethics