• DocumentCode
    2307752
  • Title

    Formal methods applied to secure network engineering

  • Author

    Chin, Shiu-Kai ; Faust, John ; Giordano, Joseph

  • Author_Institution
    Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., NY, USA
  • fYear
    1996
  • fDate
    21-25 Oct 1996
  • Firstpage
    344
  • Lastpage
    351
  • Abstract
    Security properties such as privacy, authentication and integrity are of increasing importance to networked systems. Systems with security requirements typically must operate with a high degree of confidence, i.e. they must be highly assured. We show how the message structure of privacy enhanced mail (PEM) and the operations on PEM structures have the desired implementation independent security properties. The verification of an integrity checking function is shown in detail. Higher-order logic and the HOL theorem-prover are used to precisely relate security properties to implementation specifications
  • Keywords
    algebraic specification; computer networks; data integrity; electronic mail; formal logic; formal specification; security of data; theorem proving; HOL theorem-prover; authentication; confidence; data integrity; data privacy; formal methods; higher-order logic; highly assured systems; implementation independent security; implementation specifications; integrity checking function verification; message structure; privacy enhanced mail; secure network engineering; Authentication; Computer science; Computer security; Cryptography; Digital signatures; Information security; Logic; National security; Postal services; Privacy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Engineering of Complex Computer Systems, 1996. Proceedings., Second IEEE International Conference on
  • Conference_Location
    Montreal, Que.
  • Print_ISBN
    0-8186-7614-0
  • Type

    conf

  • DOI
    10.1109/ICECCS.1996.558435
  • Filename
    558435