{"title":"Graph Homomorphisms and the Design of Secure Computer Systems","authors":"L. Moser","doi":"10.1109/SP.1987.10025","DOIUrl":null,"url":null,"abstract":"In designing and analyzing the structure and security of a large scale computer program or system, one is often interested in how it is constructed out of pieces or in the flow of information through it. The concepts of dependency, connectivity, and reparability which arise in security verification are handled well by graph theory. As is shown in this paper, graph homomorphism are particularly useful for describing the hierarchical/modular design of a system and for demonstrating the security of information flow.","PeriodicalId":123213,"journal":{"name":"1987 IEEE Symposium on Security and Privacy","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1987-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1987 IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SP.1987.10025","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In designing and analyzing the structure and security of a large scale computer program or system, one is often interested in how it is constructed out of pieces or in the flow of information through it. The concepts of dependency, connectivity, and reparability which arise in security verification are handled well by graph theory. As is shown in this paper, graph homomorphism are particularly useful for describing the hierarchical/modular design of a system and for demonstrating the security of information flow.