Computer (in)security?1: logical security
نویسندگان
چکیده
منابع مشابه
Logical Foundations of Computer Security
The first of my four lectures on the logical foundations of computer security will establish the mathematical setting in which we will work, namely computational type theory. In this setting we can pursue algorithmic ideas from their natural expression in computer science articles to their codification in executable systems and finally to their incorporation into formal arguments that a system ...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملTrust and Norms in the Context of Computer Security: A Logical Formalization
In this paper we present a logical model of trust in which trust is conceived as an expectation of the truster about some properties of the trustee. A general typology of trust is presented. We distinguish trust in the trustee’s action from trust in the trustee’s disposition (motivational or normative disposition); positive trust from negative trust. A part of the paper is devoted to the formal...
متن کاملA Modal Logical Framework for Security Policies
It turns out that security becomes more and more important in many information systems. In this paper, we are more speci cally interested in con dentiality requirement. In this context, we show how knowledge representation techniques based on formal logic can be used to propose a faithful model of con dentiality. Our approach is to develop a modal logical framework which combines doxastic and d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Quality Assurance Journal
سال: 2000
ISSN: 1087-8378,1099-1786
DOI: 10.1002/1099-1786(200012)4:4<197::aid-qaj114>3.0.co;2-b