Downloads & Free Reading Options - Results
Dtic Ada482816%3a Applying Automated Theorem Proving To Computer Security by Defense Technical Information Center
Read "Dtic Ada482816%3a Applying Automated Theorem Proving To Computer Security" by Defense Technical Information Center through these free online access and download options.
Books Results
Source: The Internet Archive
The internet Archive Search Results
Available books for downloads and borrow from The internet Archive
1DTIC ADA482816: Applying Automated Theorem Proving To Computer Security
By Defense Technical Information Center
While more and more data is stored and accessed electronically, better access control methods need to be implemented for computer security. Formal modelling and analysis have been successfully used in certain areas of computer systems, such as verifying the security properties of cryptographic and authentication protocols. However, formal models for computer systems in cyberspace, like networks, have hardly advanced. A highly regarded graduate textbook cites the Take-Grant model created in 1977 as one of the current examples of security modelling and analysis techniques. This model is rarely used in practice though. This research implements the Take-Grant Protection model's four de jure rules and Can Share predicate in the Prototype Verification System (PVS) which automates model checking and theorem proving. This facilitates the ability to test a given Take-Grant model against many systems which are modelled using digraphs. Two models, one with error checking and one without, are created to implement take-grant rules. The first model that does not have error checking incorporated requires manual error checking. The second model uses recursion to allow for the error checking. The Can Share theorem requires further development.
“DTIC ADA482816: Applying Automated Theorem Proving To Computer Security” Metadata:
- Title: ➤ DTIC ADA482816: Applying Automated Theorem Proving To Computer Security
- Author: ➤ Defense Technical Information Center
- Language: English
“DTIC ADA482816: Applying Automated Theorem Proving To Computer Security” Subjects and Themes:
- Subjects: ➤ DTIC Archive - McElroy, Kelly - AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH DEPT OF GRADUATE COMPUTER SCIENCE - *THEOREMS - *DATA PROCESSING SECURITY - *AUTOMATION - TEXTBOOKS - RECURSIVE FUNCTIONS - ACCESS - MANUAL OPERATION - THESES - COMPUTERS - CONTROL - ERROR ANALYSIS
Edition Identifiers:
- Internet Archive ID: DTIC_ADA482816
Downloads Information:
The book is available for download in "texts" format, the size of the file-s is: 44.91 Mbs, the file-s for this book were downloaded 67 times, the file-s went public at Fri Jun 22 2018.
Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find DTIC ADA482816: Applying Automated Theorem Proving To Computer Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
Buy “Dtic Ada482816%3a Applying Automated Theorem Proving To Computer Security” online:
Shop for “Dtic Ada482816%3a Applying Automated Theorem Proving To Computer Security” on popular online marketplaces.
- Ebay: New and used books.