{"title":"图同态与安全计算机系统的设计","authors":"L. Moser","doi":"10.1109/SP.1987.10025","DOIUrl":null,"url":null,"abstract":"In designing and analyzing the structure and security of a large scale computer program or system, one is often interested in how it is constructed out of pieces or in the flow of information through it. The concepts of dependency, connectivity, and reparability which arise in security verification are handled well by graph theory. As is shown in this paper, graph homomorphism are particularly useful for describing the hierarchical/modular design of a system and for demonstrating the security of information flow.","PeriodicalId":123213,"journal":{"name":"1987 IEEE Symposium on Security and Privacy","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1987-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Graph Homomorphisms and the Design of Secure Computer Systems\",\"authors\":\"L. Moser\",\"doi\":\"10.1109/SP.1987.10025\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In designing and analyzing the structure and security of a large scale computer program or system, one is often interested in how it is constructed out of pieces or in the flow of information through it. The concepts of dependency, connectivity, and reparability which arise in security verification are handled well by graph theory. As is shown in this paper, graph homomorphism are particularly useful for describing the hierarchical/modular design of a system and for demonstrating the security of information flow.\",\"PeriodicalId\":123213,\"journal\":{\"name\":\"1987 IEEE Symposium on Security and Privacy\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1987-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1987 IEEE Symposium on Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SP.1987.10025\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1987 IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SP.1987.10025","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Graph Homomorphisms and the Design of Secure Computer Systems
In designing and analyzing the structure and security of a large scale computer program or system, one is often interested in how it is constructed out of pieces or in the flow of information through it. The concepts of dependency, connectivity, and reparability which arise in security verification are handled well by graph theory. As is shown in this paper, graph homomorphism are particularly useful for describing the hierarchical/modular design of a system and for demonstrating the security of information flow.