Title :
Formal methods applied to secure network engineering
Author :
Chin, Shiu-Kai ; Faust, John ; Giordano, Joseph
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., NY, USA
Abstract :
Security properties such as privacy, authentication and integrity are of increasing importance to networked systems. Systems with security requirements typically must operate with a high degree of confidence, i.e. they must be highly assured. We show how the message structure of privacy enhanced mail (PEM) and the operations on PEM structures have the desired implementation independent security properties. The verification of an integrity checking function is shown in detail. Higher-order logic and the HOL theorem-prover are used to precisely relate security properties to implementation specifications
Keywords :
algebraic specification; computer networks; data integrity; electronic mail; formal logic; formal specification; security of data; theorem proving; HOL theorem-prover; authentication; confidence; data integrity; data privacy; formal methods; higher-order logic; highly assured systems; implementation independent security; implementation specifications; integrity checking function verification; message structure; privacy enhanced mail; secure network engineering; Authentication; Computer science; Computer security; Cryptography; Digital signatures; Information security; Logic; National security; Postal services; Privacy;
Conference_Titel :
Engineering of Complex Computer Systems, 1996. Proceedings., Second IEEE International Conference on
Conference_Location :
Montreal, Que.
Print_ISBN :
0-8186-7614-0
DOI :
10.1109/ICECCS.1996.558435