Formal methods for web security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Methods for Security

Executive Summary Cybersecurity is everyone's problem. The target may be the electric grid, government systems storing sensitive personnel data, intellectual property in the defense industrial base, or banks and the financial system. Adversaries range from small-time criminals to nation states and other determined opponents who will explore an ingenious range of attack strategies. And the damag...

متن کامل

Formal Methods for Web 2.0 Security Protocols - Position Paper

2. The network model is too detailed. The traditional model of the network as an opponent in cryptographic protocols enables the opponent to forge, alter and remove messages. In contrast, the basic protocols underlying, say, identity management frameworks assume integrity of messages. This greater abstraction permits the users and architects of Web 2.0 components to focus on semantic issues, su...

متن کامل

Formal Methods for Smartcard Security

Smartcards are trusted personal devices designed to store and process confidential data, and to act as secure tokens for providing access to applications and services. Smartcards are widely deployed and their usage spans over several application domains including banking, telecommunications, and identity. Open platform smartcards are new generation trusted personal devices with increased flexib...

متن کامل

Using Lightweight Formal Methods for JavaScript Security

sig Node { } // addr nodes and host nodes // addr hode is a non-leaf, host node is a leaf sig AddrNode extends Node { masklen: Int, hostlen: Int,

متن کامل

Formal Methods for Assuring Security of Protocols

Establishing the security of a system is an intricate problem with subtle nuances: it requires a careful examination of the underlying assumptions, abstractions, and possible actions. Consequently, assuring that a system behaves securely is virtually impossible without the use of rigorous analytical techniques. In this article, we focus on a single cryptographic protocol (Needham–Schroeder) and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Logical and Algebraic Methods in Programming

سال: 2017

ISSN: 2352-2208

DOI: 10.1016/j.jlamp.2016.08.006