Issue No.06 - November/December (2010 vol.8)
Anupam Datta , Carnegie Mellon University
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.180
Logical methods can be used to design, implement, and analyze mechanisms for enforcing security and privacy policies. This article summarizes some significant results in this area, discusses the potential for wider adoption of these methods, and highlights remaining challenges that are being addressed by ongoing research.
Security & privacy, logical methods, model checking, protocol logics, access control, audits
Anupam Datta, "Logical Methods in Security and Privacy", IEEE Security & Privacy, vol.8, no. 6, pp. 86-89, November/December 2010, doi:10.1109/MSP.2010.180