Daryl McCullough
Ithaca College
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Daryl McCullough.
ieee symposium on security and privacy | 1988
Daryl McCullough
The problem of composability of multilevel security properties, particularly the noninterference property and some of its generalizations, is discussed. Examples are used to show that some of these security properties do not compose; it is possible to connect two systems, both of which are judged to be secure, so that the composite system is not secure. A property called restrictiveness is introduced that is generally composable, so that two restrictive systems connected legally result in a new restrictive composite system. A novel feature in the brief discussion of restrictiveness is a state-machine version of the property.<<ETX>>
IEEE Transactions on Software Engineering | 1990
Daryl McCullough
A security property for trusted multilevel systems, restrictiveness, is described. It restricts the inferences a user can make about sensitive information. This property is a hookup property, or composable, meaning that a collection of secure restrictive systems when hooked together form a secure restrictive composite system. It is argued that the inference control and composability of restrictiveness make it an attractive choice for a security policy on trusted systems and processes. >
automated software engineering | 1993
Tanya Korelsky; Daryl McCullough; Owen Rambow
The automatic generation of project management reports for software engineering projects puts special demands on the knowledge representation of software engineering environments (SEEs). This knowledge can best be represented as a process model, and must include a rich type hierarchy and various kinds of entity relations. Furthermore, histories must be maintained for certain types of information, and specific information about problems must be available. These types of knowledge, while useful in particular for automatic project reporting, are more generally important if a SEE is to provide comprehensive and useful services to a user.<<ETX>>
annual computer security applications conference | 1988
Tanya Korelsky; Bill Dean; Carl Eichenlaub; James Hook; Carl Klapper; Marcos Lam; Daryl McCullough; Garrel Pottinger; Owen Rambow; David Rosenthal; Jonathan Seldin; D. G. Weber
The authors give an overview of how the Ulysses system can be used for security modeling. The default theory of security permits the security analysis of complex designs by decomposing them into their parts. System specifications may be made by using a specialized graphical language interface and a textual interface. In addition, there are a number of support tools which aid the modeler. One of these tools is the natural language component, which allows users to automatically generate short English descriptions of a graphical design. There is also a library component that facilitates the reuse of secure designs. In addition, there are mechanisms for adding security theories and other mathematical facts to augment the power of the theorem prover.<<ETX>>
ieee symposium on security and privacy | 1987
Daryl McCullough
ieee symposium on security and privacy | 1987
Daryl McCullough
international conference on natural language generation | 1998
Regina Barzilay; Daryl McCullough; Owen Rambow; Jonathan D. DeCristofaro; Tanya Korelsky; Benoit Lavoie
software engineering and knowledge engineering | 1998
Daryl McCullough; Tanya Korelsky; Michael White
Archive | 2000
Daryl McCullough; Tanya Korelsky
United States. Air Force. Systems Command | 1991
Daryl McCullough; Ian Sutherland; Tanya Korelsky