Secure Computer Systems: A Mathematical Model

نویسنده

  • iii
چکیده

This paper presents a set of rules of operation which guarantee that a computer system can remain secure while exhibiting certain desired external characteristics. The rules are easily transformable into algorithms suitable for implementation on a digital computer. iii PREFACE In our introductory paper on secure computer systems (MTR-2547, Vol. I) we introduced a framework for mathematical modeling based upon general systems theory. We then developed a basic model of a secure computer system in very abstract terms. That model is the basis from which we proceed in this paper. We present a set of rules of operation which guarantee that the system remains secure while exhibiting certain desired external characteristics. The rules of operation will be seen to be easily transformable into algorithms suitable for implementation on a digital computer.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Oesign and Specification of a Security Herne ! for the POP - 11 / 45

This paper presents the design of a kernel for certifiably secure computer systems bein~ built on the Digital Equipment Corporation PDP-11/45. The design applies a ~eneral purpose mathematical model of secure computer systems to an off-the-shelf computer. An overview of 'the model is given. The paper includes a specification of the design that will be the basis for a ri~orous proof of the corre...

متن کامل

Secure Communication in Shotgun Cellular Systems

In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...

متن کامل

Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption

In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...

متن کامل

Hybrid Time Delay Petri Nets as a Mathematical Novel Tool to Model Dynamic System with Current Sample Time

The existing modeling methods using Petri Nets‎, ‎have been successfully applied to model and analyze dynamic systems‎. ‎However‎, ‎these methods are not capable of modeling all dynamic systems such as systems with the current sample time signals‎, ‎systems including various subsystems and multi-mode systems‎. ‎This paper proposes Hybrid Time Delay Petri Nets (HTDPN) to solve the problem‎. ‎In ...

متن کامل

A new multi-step ABS model to solve full row rank linear systems

ABS methods are direct iterative methods for solving linear systems of equations, where the i-th iteration satisfies the first i equations. Thus, a system of m equations is solved in at most m ABS iterates. In 2004 and 2007, two-step ABS methods were introduced in at most [((m+1))/2] steps to solve full row rank linear systems of equations. These methods consuming less space, are more compress ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996