White paper: Programming according to the fences and gates model for developing assured, secure software systems. Behrends, R., Dillon, L. K., Fleming, S. D., & Stirewalt, R. E. K. Technical Report MSU-CSE-06-2, Department of Computer Science, Michigan State University, East Lansing, Michigan, January, 2006. Paper abstract bibtex This white paper describes extensions to our work on the Synchronization Units Model (Szumo) to address the access-control problem in systems assembled dynamically from trusted and untrusted components. Our extension employs explicitly declared design contracts, the semantics of which are founded on Landwehr's model of fences and gates.
@techreport{MSU-CSE-06-2,
AUTHOR = {R. Behrends and L. K. Dillon and S. D. Fleming and
R. E. K. Stirewalt},
TITLE = {White paper: Programming according to the fences and gates
model for developing assured, secure software
systems},
NUMBER = {MSU-CSE-06-2},
INSTITUTION = {Department of Computer Science, Michigan State University},
ADDRESS = {East Lansing, Michigan},
ABSTRACT = {This white paper describes extensions to our work on the
Synchronization Units Model (Szumo) to address the
access-control problem in systems assembled dynamically from
trusted and untrusted components. Our extension employs
explicitly declared design contracts, the semantics of which
are founded on Landwehr's model of fences and gates.
},
KEYWORDS = {access control, security, contracts, Szumo},
NOTE = {},
MONTH = {January},
YEAR = {2006},
AUTHOR1_URL = {http://www.poker-ping.info},
AUTHOR1_EMAIL = {kel@wondering-jons.com},
AUTHOR1_URL = {},
AUTHOR1_EMAIL = {behrends@cse.msu.edu},
AUTHOR2_URL = {Sle},
AUTHOR2_EMAIL = {Poker Ping},
AUTHOR2_URL = {http://www.cse.msu.edu/~stire},
AUTHOR2_EMAIL = {stire@cse.msu.edu},
PAGES = {3},
FILE = {/user/web/htdocs/publications/tech/TR/MSU-CSE-06-2.ps},
URL = {},
CONTACT = {stire@cse.msu.edu}
}
Downloads: 0
{"_id":"6XS8i3vr3xjRyKCzQ","bibbaseid":"behrends-dillon-fleming-stirewalt-whitepaperprogrammingaccordingtothefencesandgatesmodelfordevelopingassuredsecuresoftwaresystems-2006","downloads":0,"creationDate":"2016-03-23T14:53:19.566Z","title":"White paper: Programming according to the fences and gates model for developing assured, secure software systems","author_short":["Behrends, R.","Dillon, L. K.","Fleming, S. D.","Stirewalt, R. E. K."],"year":2006,"bibtype":"techreport","biburl":"http://cjeldes.duckdns.org/wp-content/themes/yahootheme/data.bib","bibdata":{"bibtype":"techreport","type":"techreport","author":[{"firstnames":["R."],"propositions":[],"lastnames":["Behrends"],"suffixes":[]},{"firstnames":["L.","K."],"propositions":[],"lastnames":["Dillon"],"suffixes":[]},{"firstnames":["S.","D."],"propositions":[],"lastnames":["Fleming"],"suffixes":[]},{"firstnames":["R.","E.","K."],"propositions":[],"lastnames":["Stirewalt"],"suffixes":[]}],"title":"White paper: Programming according to the fences and gates model for developing assured, secure software systems","number":"MSU-CSE-06-2","institution":"Department of Computer Science, Michigan State University","address":"East Lansing, Michigan","abstract":"This white paper describes extensions to our work on the Synchronization Units Model (Szumo) to address the access-control problem in systems assembled dynamically from trusted and untrusted components. Our extension employs explicitly declared design contracts, the semantics of which are founded on Landwehr's model of fences and gates. ","keywords":"access control, security, contracts, Szumo","note":"","month":"January","year":"2006","author1_url":"","author1_email":"behrends@cse.msu.edu","author2_url":"http://www.cse.msu.edu/~stire","author2_email":"stire@cse.msu.edu","pages":"3","file":"/user/web/htdocs/publications/tech/TR/MSU-CSE-06-2.ps","url":"","contact":"stire@cse.msu.edu","bibtex":"@techreport{MSU-CSE-06-2,\r\n AUTHOR = {R. Behrends and L. K. Dillon and S. D. Fleming and\r\n R. E. K. Stirewalt},\r\n TITLE = {White paper: Programming according to the fences and gates\r\n model for developing assured, secure software\r\n systems},\r\n NUMBER = {MSU-CSE-06-2},\r\n INSTITUTION = {Department of Computer Science, Michigan State University},\r\n ADDRESS = {East Lansing, Michigan},\r\n ABSTRACT = {This white paper describes extensions to our work on the\r\n Synchronization Units Model (Szumo) to address the\r\n access-control problem in systems assembled dynamically from\r\n trusted and untrusted components. Our extension employs\r\n explicitly declared design contracts, the semantics of which\r\n are founded on Landwehr's model of fences and gates.\r\n },\r\n KEYWORDS = {access control, security, contracts, Szumo},\r\n NOTE = {},\r\n MONTH = {January},\r\n YEAR = {2006},\r\n AUTHOR1_URL = {http://www.poker-ping.info},\r\n AUTHOR1_EMAIL = {kel@wondering-jons.com},\r\n AUTHOR1_URL = {},\r\n AUTHOR1_EMAIL = {behrends@cse.msu.edu},\r\n AUTHOR2_URL = {Sle},\r\n AUTHOR2_EMAIL = {Poker Ping},\r\n AUTHOR2_URL = {http://www.cse.msu.edu/~stire},\r\n AUTHOR2_EMAIL = {stire@cse.msu.edu},\r\n PAGES = {3},\r\n FILE = {/user/web/htdocs/publications/tech/TR/MSU-CSE-06-2.ps},\r\n URL = {},\r\n CONTACT = {stire@cse.msu.edu}\r\n}","author_short":["Behrends, R.","Dillon, L. K.","Fleming, S. D.","Stirewalt, R. E. K."],"key":"MSU-CSE-06-2","id":"MSU-CSE-06-2","bibbaseid":"behrends-dillon-fleming-stirewalt-whitepaperprogrammingaccordingtothefencesandgatesmodelfordevelopingassuredsecuresoftwaresystems-2006","role":"author","urls":{"Paper":"http://cjeldes.duckdns.org/wp-content/themes/yahootheme/data.bib"},"keyword":["access control","security","contracts","Szumo"],"downloads":0},"search_terms":["white","paper","programming","according","fences","gates","model","developing","assured","secure","software","systems","behrends","dillon","fleming","stirewalt"],"keywords":["access control","security","contracts","szumo"],"authorIDs":[],"dataSources":["Kdis4CvQvx5zC9nE2"]}