Formal Methods in Information Security
Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY (Vol.14, No. 4)Publication Date: 2015-02-28
Authors : AJAYI ADEBOWALE; NICULAE GOGA; OTUSILE OLUWABUKOLA; ABEL SAMUEL;
Page : 5621-5631
Keywords : Formal Methods; Information Security; protocol engineering;
Abstract
Formal methods use mathematical models for analysis and verification at any part of the programlife-cycle. The use of formal methods is admitted, recommended, and sometimes prescribed in safety-and security-related standards dealing, e.g., with avionics, railways, nuclear energy, and secure information systems.This paper describes the state of the art in the industrial use of formal methods ininformation security with a focus on verification of security protocols. Given the vast scope of available solutions, attention has been focused just on the most popular and most representative ones, without exhaustiveness claims.We describe some of the highlights of our survey by presenting a series of industrial projects, and we draw some observations from these surveys and records of experience. Based on this, we discuss issues surrounding the industrial adoption of formal methods in security protocol engineering.
Other Latest Articles
- IMPROVED ANT COLONY LOAD BALANCING ALGORITHM IN CLOUD COMPUTING
- An Ameliorated Methodology for Ranking the Tuple
- Evaluating a Model for Implementing Knowledge Management in Banking Informatics Corporations in Iran
- Prediction of Daily Concentration of Carbon Monoxide based on PCA-ANN
- DSS FOR IMPLEMENTING SYSTEMIC APPROACH TO FORECASTING
Last modified: 2016-06-29 16:22:13