A Symbiotic Relationship Between Formal Methods and Security

نویسنده

  • Jeannette M. Wing
چکیده

" Security played a significant role in the development of formal methods in the 70s and early 80s. Have the tables turned? Are formal methods now ready to play a significant role in the development of more secure systems? While not a panacea, the answer is yes, formal methods can and should play such a role. In this paper we first review the limits of formal methods. Then after a brief historical excursion, we summa rize some recent results on how model checking and theorem proving tools revealed new and known flaws in authentication protocols. Looking to the .future we discuss the challenges and opportunities for .formal methods in analyzing the security of systems, above and beyond the protocol level. ...

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Relationship between antioxidant traits of Symbiodinium sp. symbiotic dinoflagellate extract under physicochemical factors during different seasons in Persian Gulf and Gulf of Oman

Coral bleaching, loss of symbiotic algae of Symbiodinium sp. or photosynthetic microalgae pigments from their coral host have become commonplace in recent decades due to the rising of sea temperatures and changes in physicochemical factors. It is essential to study the susceptibility of corals to bleaching, the physiology of its symbiotic algae, and its capacity to cope with abiotic stress. Oxi...

متن کامل

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

Mediating Role of Psychological Security in the Relationship between Optimism and Self-Compassion with Psychological Well-Being in Veterans’ Spouses

Aims: After the end of the war and the return of the warriors to the family, due to the stresses of the war and its devastating effect on the spirit and soul of the veterans, the adverse effects of war on the family, especially the spous, continue.The aim of this study was to investigate the mediating role of psychological security in the relationship between optimism and self-compassion with p...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998