The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (2010 vol.8)
pp: 86-89
Anupam Datta , Carnegie Mellon University
Logical methods can be used to design, implement, and analyze mechanisms for enforcing security and privacy policies. This article summarizes some significant results in this area, discusses the potential for wider adoption of these methods, and highlights remaining challenges that are being addressed by ongoing research.
Security & privacy, logical methods, model checking, protocol logics, access control, audits
Anupam Datta, "Logical Methods in Security and Privacy", IEEE Security & Privacy, vol.8, no. 6, pp. 86-89, November/December 2010, doi:10.1109/MSP.2010.180
1. P. Ryan et al., Mod-elling and Analysis of Security Protocols, Addison-Wesley, 2001.
2. M. Burrows, M. Abadi, and R. Needham, "A Logic of Authentication," ACM Trans. Computer Systems, vol. 8, no. 1, 1990, pp. 18–36.
3. A. Datta et al., "Protocol Composition Logic (PCL)," Electronic Notes in Theoretical Computer Science, vol. 172, Apr. 2007, pp. 311–358.
4. B.W. Lampson et al., "Authen-tication in Distributed Systems: Theory and Practice," ACM Trans. Computer Systems, vol. 10, no. 4, 1992, pp. 265–310.
5. A. Barth et al., "Privacy and Contextual Integrity: Framework and Applications," IEEE Symp. Security and Privacy, 2006, pp. 184–198.
31 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool