Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where William E. Boebert is active.

Publication


Featured researches published by William E. Boebert.


ieee symposium on security and privacy | 1985

Secure Ada Target: Issues, System Design, and Verification

William E. Boebert; R. Y. Kaln; William D. Young; S. A. Hansohn

The Secure Ada Target (SAT) machine is designed to meet or exceed the DoD requirements for multi-level secure systems. This paper describes the require-ments on such designs, our approach to meeting these requirements by introducing tagged objects, and a specialized tagged object processor (TOP) that handles all operations involving tagged objects. Basic system security is achieved using a small software kernel and the TOP. The structure of our proofs, such that the system satisfies appropriate security properties, will be outlined. Brief remarks concerning the implementation of user Ada programs on the SAT system conclude the paper. Our design approach is largely independent of CPU selection, though implementation details necessarily depend on the processor selection.


formal methods | 1979

An Approach to the Specification of Distributed Software

William R. Franta; William E. Boebert; Helmut K. Berg

In this paper we first characterize distributed systems. Next we survey recently proposed programming constructs designed to facilitate communication amongst software elements of a distributed system. We then give the basis of a methodology for the formal specification of distributed systems, and follow with an example to clarify the technique. We close with a discussion of necessary extensions to the methodology and a review of the objectives of specification.


Archive | 1985

A practical alternative to hierarchical integrity policies

William E. Boebert; Richard Y. Kain


Archive | 1985

Secure data processing system architecture with format control

William E. Boebert; Richard Y. Kain


Archive | 1984

Secure data processing system architecture

William E. Boebert; Richard Y. Kain


Archive | 1985

Secure Computing: The Secure Ada Target Approach

William E. Boebert; Richard Y. Kain; William D. Young


Archive | 1986

Method of protecting system files and data processing unit for implementing said method

William E. Boebert; Richard Y. Kain


Archive | 1985

Secure ada target: issues

William E. Boebert; William D. Young; Richard Y. Kain; S. A. Hansohn


Archive | 1985

Data processing system having protected system files

William E. Boebert; Richard Y. Kain


Archive | 1982

A survey of formal methods of program verification and specification

W. A. Berg; William E. Boebert; William R. Franta; Thomas G. Moher

Collaboration


Dive into the William E. Boebert's collaboration.

Top Co-Authors

Avatar

William D. Young

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

R. Y. Kaln

University of Minnesota

View shared research outputs
Top Co-Authors

Avatar

Thomas G. Moher

University of Illinois at Chicago

View shared research outputs
Researchain Logo
Decentralizing Knowledge