DocumentCode :
274812
Title :
Security modeling in the Ulysses environment
Author :
Korelsky, Tanya ; Dean, Bill ; Eichenlaub, Carl ; Hook, James ; Klapper, Carl ; Lam, Marcos ; McCullough, Daryl ; Pottinger, Garrel ; Rambow, Owen ; Rosenthal, David ; Seldin, Jonathan P. ; Weber, D.G.
Author_Institution :
Odyssey Res. Associates Inc., Ithaca, NY, USA
fYear :
1988
fDate :
12-16 Dec 1988
Firstpage :
386
Lastpage :
392
Abstract :
The authors give an overview of how the Ulysses system can be used for security modeling. The default theory of security permits the security analysis of complex designs by decomposing them into their parts. System specifications may be made by using a specialized graphical language interface and a textual interface. In addition, there are a number of support tools which aid the modeler. One of these tools is the natural language component, which allows users to automatically generate short English descriptions of a graphical design. There is also a library component that facilitates the reuse of secure designs. In addition, there are mechanisms for adding security theories and other mathematical facts to augment the power of the theorem prover
Keywords :
security of data; software tools; specification languages; theorem proving; user interfaces; English descriptions; Ulysses system; graphical design; graphical language interface; natural language component; secure designs; security analysis; security modeling; security theories; textual interface; theorem prover; Contracts; Data security; Flow graphs; Graphics; Libraries; Logic; Natural languages; Power system modeling; Power system security; Software engineering;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Aerospace Computer Security Applications Conference, 1988., Fourth
Conference_Location :
Orlando, FL
Print_ISBN :
0-8186-0895-1
Type :
conf
DOI :
10.1109/ACSAC.1988.113337
Filename :
113337
Link To Document :
بازگشت