Information Assurance
An Operating Systems Perspective
This book is to appear in 2005 with Cambridge University Press.
The table of contents provided below is still to some extent tentative as
chapters may be split or moved and the overall page limit needs to be
maintained. In particular, the list of case studies is as yet still in
flux.
In case of questions and comments please contact me at stephenwolthusen.com.
Contents
Part I: Foundations
- Introduction
- Design Criteria
- Modeling Confidentiality
- Modeling Integrity
- Modeling Availability
- Safety and Timeliness
Part II: Mechanisms
- Entity Separation
- Reference Monitors
- Capabilities
- Identification and Authentication Mechanisms
Part III: Developmental Assurance
- The Role of Assurance
- Formal Methods for Specification
- Program Verification and Model Checking
- Evaluation Criteria
Part IV: Case Studies
- ADEPT-50
- Multics, Guardian, and AIM
- PSOS
- The Intel 432 Environment
- DTOS and DTMach
- COSEDA
Part V: Conclusion
|
This page and all contents (unless otherwise noted) are
Copyright © 2002-2003 by Stephen D. Wolthusen
All rights reserved.
|