Accession Number:

ADA065111

Title:

A Validation Technique for Computer Security Based on the Theory of Constraints,

Descriptive Note:

Corporate Author:

MITRE CORP BEDFORD MASS

Personal Author(s):

Report Date:

1978-12-01

Pagination or Media Count:

67.0

Abstract:

A validation technique is described that is both necessary and sufficient to test for security compromise. A LISP program documented in this report automates a substantial portion of the validation process. The theory of constraints, which incorporates elements of switching theory and automata theory, provides the mathematical foundation. In addition to detecting compromise, the approach may be used to prove a wide range of properties about system behavior. The technique is suited to both hardware and software, and is applicable at various levels of specification. Author

Subject Categories:

  • Computer Programming and Software

Distribution Statement:

APPROVED FOR PUBLIC RELEASE