NASA Logo

NTRS

NTRS - NASA Technical Reports Server

Back to Results
Analyzing the security of an existing computer systemMost work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.
Document ID
19860023557
Acquisition Source
Legacy CDMS
Document Type
Technical Memorandum (TM)
Authors
Bishop, M.
(NASA Ames Research Center Moffett Field, CA, United States)
Date Acquired
September 5, 2013
Publication Date
May 1, 1986
Subject Category
Computer Operations And Hardware
Report/Patent Number
RIACS-TR-86.13
NASA-TM-89205
NAS 1.15:89205
Report Number: RIACS-TR-86.13
Report Number: NASA-TM-89205
Report Number: NAS 1.15:89205
Accession Number
86N33029
Funding Number(s)
CONTRACT_GRANT: NAS2-11530
Distribution Limits
Public
Copyright
Work of the US Gov. Public Use Permitted.
No Preview Available