Verifying Operating System Security
citeseer.ist.psu.eduA confined program is one unable to leak information to an unauthorized party or modify unauthorized resources, an essential feature of any secure component based system. A proof of correctness of EROS architecture for confinement. [ResearchIndex]