Conference paper Open Access

Formal Methods for MILS: Formalisations of the GWV Firewall

Koolen, Ruud; Schmaltz, Julien


JSON Export

{
  "conceptrecid": "630855", 
  "created": "2016-03-21T09:00:44+00:00", 
  "doi": "10.5281/zenodo.47983", 
  "files": [
    {
      "bucket": "441c86e0-c0fa-495d-a9a6-3dfbdb703894", 
      "checksum": "md5:0920cf93f116682da75f3e8d31a8024b", 
      "key": "12-mils15_submission_4.pdf", 
      "links": {
        "self": "https://zenodo.org/api/files/441c86e0-c0fa-495d-a9a6-3dfbdb703894/12-mils15_submission_4.pdf"
      }, 
      "size": 235545, 
      "type": "pdf"
    }
  ], 
  "id": 47983, 
  "links": {
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.47983.svg", 
    "bucket": "https://zenodo.org/api/files/441c86e0-c0fa-495d-a9a6-3dfbdb703894", 
    "doi": "https://doi.org/10.5281/zenodo.47983", 
    "html": "https://zenodo.org/record/47983", 
    "latest": "https://zenodo.org/api/records/47983", 
    "latest_html": "https://zenodo.org/record/47983"
  }, 
  "metadata": {
    "access_right": "open", 
    "access_right_category": "success", 
    "communities": [
      {
        "id": "mils"
      }
    ], 
    "creators": [
      {
        "affiliation": "Eindhoven University of Technology", 
        "name": "Koolen, Ruud"
      }, 
      {
        "affiliation": "Eindhoven University of Technology", 
        "name": "Schmaltz, Julien"
      }
    ], 
    "description": "<p>To achieve security certification according to the highest levels of assurance, formal models and proofs of security properties are required. In the MILS context, this includes formalisation of key components -\u00a0such as separation kernels -\u00a0and the formalisation of applications built on top of these\u00a0verified components. In this paper, we use the Isabelle/HOL\u00a0proof assistant to formalise the Firewall application built on\u00a0top of a verified separation kernel according to the model\u00a0of Greve, Wilding, and Vanfleet (GWV). This Firewall application has been formalised twice after the original effort\u00a0by GWV. These different efforts have been compared and<br>\ndiscussed on paper. Our main contribution is to provide a\u00a0formal comparison between these formalisations in the formal logic of a proof assistant.</p>", 
    "doi": "10.5281/zenodo.47983", 
    "keywords": [
      "MILS"
    ], 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "meeting": {
      "dates": "20 January 2015", 
      "place": "Amsterdam", 
      "title": "International Workshop on MILS: Architecture and Assurance for Secure Systems"
    }, 
    "publication_date": "2015-01-20", 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "47983"
          }, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "630855"
          }
        }
      ]
    }, 
    "resource_type": {
      "subtype": "conferencepaper", 
      "title": "Conference paper", 
      "type": "publication"
    }, 
    "title": "Formal Methods for MILS: Formalisations of the GWV Firewall"
  }, 
  "owners": [
    20034
  ], 
  "revision": 9, 
  "stats": {
    "downloads": 9.0, 
    "unique_downloads": 8.0, 
    "unique_views": 11.0, 
    "version_downloads": 9.0, 
    "version_unique_downloads": 8.0, 
    "version_unique_views": 11.0, 
    "version_views": 11.0, 
    "version_volume": 2119905.0, 
    "views": 11.0, 
    "volume": 2119905.0
  }, 
  "updated": "2017-09-08T08:29:09.106982+00:00"
}
11
9
views
downloads
All versions This version
Views 1111
Downloads 99
Data volume 2.1 MB2.1 MB
Unique views 1111
Unique downloads 88

Share

Cite as