This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Logical Methods in Security and Privacy
November/December 2010 (vol. 8 no. 6)
pp. 86-89
Anupam Datta, Carnegie Mellon University
Logical methods can be used to design, implement, and analyze mechanisms for enforcing security and privacy policies. This article summarizes some significant results in this area, discusses the potential for wider adoption of these methods, and highlights remaining challenges that are being addressed by ongoing research.

1. P. Ryan et al., Mod-elling and Analysis of Security Protocols, Addison-Wesley, 2001.
2. M. Burrows, M. Abadi, and R. Needham, "A Logic of Authentication," ACM Trans. Computer Systems, vol. 8, no. 1, 1990, pp. 18–36.
3. A. Datta et al., "Protocol Composition Logic (PCL)," Electronic Notes in Theoretical Computer Science, vol. 172, Apr. 2007, pp. 311–358.
4. B.W. Lampson et al., "Authen-tication in Distributed Systems: Theory and Practice," ACM Trans. Computer Systems, vol. 10, no. 4, 1992, pp. 265–310.
5. A. Barth et al., "Privacy and Contextual Integrity: Framework and Applications," IEEE Symp. Security and Privacy, 2006, pp. 184–198.

Index Terms:
Security & privacy, logical methods, model checking, protocol logics, access control, audits
Citation:
Anupam Datta, "Logical Methods in Security and Privacy," IEEE Security & Privacy, vol. 8, no. 6, pp. 86-89, Nov.-Dec. 2010, doi:10.1109/MSP.2010.180
Usage of this product signifies your acceptance of the Terms of Use.