Formal Foundations of Computer Security
نویسنده
چکیده
منابع مشابه
Formal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملLogical Foundations of Computer Security
The first of my four lectures on the logical foundations of computer security will establish the mathematical setting in which we will work, namely computational type theory. In this setting we can pursue algorithmic ideas from their natural expression in computer science articles to their codification in executable systems and finally to their incorporation into formal arguments that a system ...
متن کاملA Structured Operational Modelling of the Dolev-Yao Threat Model
In the areas of computer security and cryptography a standard model for adversaries is the Dolev-Yao threat model . In the areas of formal analysis of complex, concurrent, communication and reactive systems, one of the foundations for formal analysis methodologies is a structured operational semantics (SOS) for Milner’s process algebra Calculus of Communicating Systems (CCS). In this paper we p...
متن کاملFoundations for Auditing Assurance
Retrospective security is an important element of layered security systems. Auditing is central to the theory and practice of retrospective security, however, in systems where auditing is used, programs are typically instrumented to generate audit logs using manual, adhoc strategies. This is a potential source of error even if log auditing techniques are formal, since the relation of the log it...
متن کاملFair Exchange
transition relations. In Proc. 16th Ann. IEEE Symp. on Logic in Computer Science, Boston, MA, June, pp. 51–58.IEEE Computer Society Press, Los Alamitos, CA. [77] Kremer, S. and Raskin, J.-F. (2002) Game analysis of abuse-free contract signing. In Proc. 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada,June. IEEE Computer Society Press, Los Alamitos, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008