{"title":"Mechanizing Security In HOL","authors":"W. Harrison, K. Levitt","doi":"10.1109/HOL.1991.596273","DOIUrl":null,"url":null,"abstract":"Four definitions or “models” of security are described formally and with examples. The formalization into HOL of three of these models is demonstrated. The relative strengths of these definitions is discussed with respect to adequacy, mechanizability, and provability. Mechanizability refers to how susceptible the model is to formalization in a language like HOL or EHDM [2]. Provability refers to the difficulty of verifying that a particular system has a desired security property. The “non-interference” and “restrictiveness” models described in sections 3 and 4 are concise and elegant, but verifying that a system has either of these properties generally involves lengthy and complicated inductions [l].","PeriodicalId":213603,"journal":{"name":"1991., International Workshop on the HOL Theorem Proving System and Its Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1991., International Workshop on the HOL Theorem Proving System and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HOL.1991.596273","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Four definitions or “models” of security are described formally and with examples. The formalization into HOL of three of these models is demonstrated. The relative strengths of these definitions is discussed with respect to adequacy, mechanizability, and provability. Mechanizability refers to how susceptible the model is to formalization in a language like HOL or EHDM [2]. Provability refers to the difficulty of verifying that a particular system has a desired security property. The “non-interference” and “restrictiveness” models described in sections 3 and 4 are concise and elegant, but verifying that a system has either of these properties generally involves lengthy and complicated inductions [l].