By Topic

IEEE Transactions on Software Engineering

Issue 6 • Date Jun 1990

Filter Results

Displaying Results 1 - 10 of 10
  • A hookup theorem for multilevel security

    Publication Year: 1990, Page(s):563 - 568
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    A security property for trusted multilevel systems, restrictiveness, is described. It restricts the inferences a user can make about sensitive information. This property is a hookup property, or composable, meaning that a collection of secure restrictive systems when hooked together form a secure restrictive composite system. It is argued that the inference control and composability of restrictive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Memory access dependencies in shared-memory multiprocessors

    Publication Year: 1990, Page(s):660 - 673
    Cited by:  Papers (31)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1336 KB)

    The presence of high-performance mechanisms in shared-memory multiprocessors such as private caches, the extensive pipelining of memory access, and combining networks may render a logical concurrency model complex to implement or inefficient. The problem of implementing a given logical concurrency model in such a multiprocessor is addressed. Two concurrency models are considered, and simple rules ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ABYSS: an architecture for software protection

    Publication Year: 1990, Page(s):619 - 629
    Cited by:  Papers (11)  |  Patents (104)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1040 KB)

    ABYSS (a basic Yorktown security system) is an architecture for protecting the execution of application software. It supports a uniform security service across the range of computing systems. The use of ABYSS in solving the software protection problem, especially in the lower end of the market, is discussed. Both current and planned software distribution channels are supportable by the architectur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model for multilevel security in computer networks

    Publication Year: 1990, Page(s):647 - 659
    Cited by:  Papers (4)  |  Patents (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1264 KB)

    A model is presented that precisely describes the mechanism that enforces the security policy and requirements for a multilevel secure network. The mechanism attempts to ensure secure flow of information between entities assigned to different security classes in different computer systems connected to the network. The mechanism also controls the access to the network devices by the subjects (users... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compartmented mode workstation: prototype highlights

    Publication Year: 1990, Page(s):608 - 618
    Cited by:  Papers (7)  |  Patents (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB)

    The primary goal of the MITRE compartmented mode workstation (CMW) project was to articulate the security requirements that workstations must meet to process highly classified intelligence data. As a basis for the validity of the requirements developed, a prototype was implemented which demonstrated that workstations could meet the requirements in an operationally useful manner while still remaini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A transportable programming language (TPL) system. II. The bifunctional compiler system

    Publication Year: 1990, Page(s):639 - 646
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    For pt.I see P.A.D. de Maine, S. Leong, and C.G. Dairs, Int. J. Comput. Inform. Sci., vol.14, p.161-82, 1985. The transportable programming language (TPL) method is a high-level-language approach that uses a bifunctional compiler to efficiently convert code among various dialects of a particular high-level language (HLL) via the hypothetical parent of the high-level language (HPHLL). The TPL compi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The SeaView security model

    Publication Year: 1990, Page(s):593 - 607
    Cited by:  Papers (32)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1420 KB)

    A multilevel database is intended to provide the security needed for database systems that contain data at a variety of classifications and serve a set of users having different clearances. A formal security model for such a system is described. The model is formulated in two layers, one corresponding to a reference monitor that enforces mandatory security, and the second an extension of the stand... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the identification of covert storage channels in secure systems

    Publication Year: 1990, Page(s):569 - 580
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1080 KB)

    A practical method for the identification of covert storage channels is presented and its application to the source code of the Secure Xenix kernel is illustrated. The method is based on the identification of all visible/alterable kernel variables by using information-flow analysis of language code. The method also requires that, after the sharing relationships among the kernel primitives and the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A language for specifying program transformations

    Publication Year: 1990, Page(s):630 - 638
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    A language is described for specifying program transformations, from which programs can be generated to perform the transformations on sequences of code. The main objective of this work has been to develop a language that would allow the user to quickly and easily specify a wide range of transformations for a variety of programming languages. The rationale for the language constructs is given, as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A specification and verification method for preventing denial of service

    Publication Year: 1990, Page(s):581 - 592
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1116 KB)

    A specification and verification method is presented for preventing denial of service in absence of failures and of integrity violations. The notion of user agreements is introduced, and it is argued that lack of specifications for these agreements and for simultaneity conditions makes it impossible to demonstrate denial-of-service prevention, in spite of demonstrably fair service access. The use ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org