Issue No. 06 - November/December (2010 vol. 8)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.180
Anupam Datta , Carnegie Mellon University
Logical methods can be used to design, implement, and analyze mechanisms for enforcing security and privacy policies. This article summarizes some significant results in this area, discusses the potential for wider adoption of these methods, and highlights remaining challenges that are being addressed by ongoing research.
Security & privacy, logical methods, model checking, protocol logics, access control, audits
A. Datta, "Logical Methods in Security and Privacy," in IEEE Security & Privacy, vol. 8, no. , pp. 86-89, 2010.