Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network

  Advanced Search  

Survey on the Use of Formal Languages/Models for the Specification,

Summary: Survey on the Use of Formal
Languages/Models for the Specification,
Verification, and Enforcement of Network
Adel El-Atawy
School of Computer Science,
Telecommunication, and Information Systems
DePaul University
Chicago, Illinois 60604
Email: aelatawy@cs.depaul.edu
April 12, 2006
Complexity of access-lists and the diversity of their specifications
are continuously increasing. Stating the high level requirements as
well as verification of the implemented policies became an impossible
task if human intervention is required. Also, proving the soundness of
these inter-related and confusing policies is very hard without an ap-
propriate framework. Therefore, a formal and canonical specification
for security access-lists is highly needed for us to be able to specify
requirements, verify correctness and enforce the policy.


Source: Al-Shaer, Ehab - School of Computer Science, Telecommunications and Information Systems, DePaul University


Collections: Computer Technologies and Information Sciences