Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Survey on the Use of Formal Languages/Models for the Specification,
 

Summary: Survey on the Use of Formal
Languages/Models for the Specification,
Verification, and Enforcement of Network
Access-lists
Adel El-Atawy
School of Computer Science,
Telecommunication, and Information Systems
DePaul University
Chicago, Illinois 60604
Email: aelatawy@cs.depaul.edu
April 12, 2006
Abstract
Complexity of access-lists and the diversity of their specifications
are continuously increasing. Stating the high level requirements as
well as verification of the implemented policies became an impossible
task if human intervention is required. Also, proving the soundness of
these inter-related and confusing policies is very hard without an ap-
propriate framework. Therefore, a formal and canonical specification
for security access-lists is highly needed for us to be able to specify
requirements, verify correctness and enforce the policy.

  

Source: Al-Shaer, Ehab - School of Computer Science, Telecommunications and Information Systems, DePaul University

 

Collections: Computer Technologies and Information Sciences