Title : 
Formal methods applied to secure network engineering
         
        
            Author : 
Chin, Shiu-Kai ; Faust, John ; Giordano, Joseph
         
        
            Author_Institution : 
Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., NY, USA
         
        
        
        
        
        
            Abstract : 
Security properties such as privacy, authentication and integrity are of increasing importance to networked systems. Systems with security requirements typically must operate with a high degree of confidence, i.e. they must be highly assured. We show how the message structure of privacy enhanced mail (PEM) and the operations on PEM structures have the desired implementation independent security properties. The verification of an integrity checking function is shown in detail. Higher-order logic and the HOL theorem-prover are used to precisely relate security properties to implementation specifications
         
        
            Keywords : 
algebraic specification; computer networks; data integrity; electronic mail; formal logic; formal specification; security of data; theorem proving; HOL theorem-prover; authentication; confidence; data integrity; data privacy; formal methods; higher-order logic; highly assured systems; implementation independent security; implementation specifications; integrity checking function verification; message structure; privacy enhanced mail; secure network engineering; Authentication; Computer science; Computer security; Cryptography; Digital signatures; Information security; Logic; National security; Postal services; Privacy;
         
        
        
        
            Conference_Titel : 
Engineering of Complex Computer Systems, 1996. Proceedings., Second IEEE International Conference on
         
        
            Conference_Location : 
Montreal, Que.
         
        
            Print_ISBN : 
0-8186-7614-0
         
        
        
            DOI : 
10.1109/ICECCS.1996.558435