Formal methods applied to secure network engineering

Shiu Kai Chin, John Faust, Joseph Giordano

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security properties such as privacy, authentication, and integrity are of increasing importance to networked systems. Systems with security requirements typically must operate with a high degree of confidence, i.e. they must be highly assured. We show how the message structure of Privacy Enhanced Mail (PEM) and the operations on PEM structures have the desired implementation-independent security properties. The verification of an integrity checking function is shown in detail. Higher-order logic and the HOL theorem-prover are used to precisely relate security properties to implementation specifications.

Original languageEnglish (US)
Title of host publicationProceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS
PublisherIEEE Computer Society
Pages344-351
Number of pages8
StatePublished - 1996
EventProceedings of the 1996 2nd IEEE International Conference on Engineering of Complex Computer Systems - Montreal, Can
Duration: Oct 21 1996Oct 25 1996

Other

OtherProceedings of the 1996 2nd IEEE International Conference on Engineering of Complex Computer Systems
CityMontreal, Can
Period10/21/9610/25/96

ASJC Scopus subject areas

  • Computer Science(all)
  • Engineering(all)

Fingerprint Dive into the research topics of 'Formal methods applied to secure network engineering'. Together they form a unique fingerprint.

  • Cite this

    Chin, S. K., Faust, J., & Giordano, J. (1996). Formal methods applied to secure network engineering. In Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS (pp. 344-351). IEEE Computer Society.