Formal Methods in Information Security

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 4

Abstract

Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. The use of formal methods is admitted, recommended, and sometimes prescribed in safety-and security-related standards dealing, e.g., with avionics, railways, nuclear energy, and secure information systems. This paper describes the state of the art in the industrial use of formal methods ininformation security with a focus on verification of security protocols. Given the vast scope of available solutions, attention has been focused just on the most popular and most representative ones, without exhaustiveness claims. We describe some of the highlights of our survey by presenting a series of industrial projects, and we draw some observations from these surveys and records of experience. Based on this, we discuss issues surrounding the industrial adoption of formal methods in security protocol engineering.

Authors and Affiliations

AJAYI ADEBOWALE, NICULAE GOGA, OTUSILE OLUWABUKOLA, ABEL SAMUEL

Keywords

Related Articles

OPTIMIZATION OF CHANNEL ALLOCATION ALGORITHM FOR HOT SPOT CELLS IN WIRELESS NETWORKS

Dense deployment of cellular networks is leading to scarcity of communication bandwidth or what we call as channel. If compared to its wired counterparts, wireless cellular network have limited number of channels availab...

A NOVEL APPROACH OF CLUSTERING FOR ENHANCED LIFETIME IN WIRELESS SENSOR NETWORK

Wireless sensor network has revolutionized the way computing and software services are delivered to the clients on demand. Our research work proposed a new method for cluster head selection having less computational comp...

Mobile Health Monitoring System using Fuzzy Logic

This paper was tested on a set of data in order to prove its effectiveness. Simulation gives promising results in detecting the activity of the person. This is efficient system for health monitoring as compare with conve...

Ontological Engineering Approach Towards Botnet Detection in Network Forensics

The abundance in the usage of Internet, in every arena of life from social to personal, commercial to domestic and other aspects of life as well, leads the rise in cybercrime at an upsetting speed. More illegal activitie...

A Survey On Cloud Computing and Its Various Services

Cloud computing is a hot topic all over the world nowadays, through which customers can access information and computer power via a web browser. As the adoption and deployment of cloud computing increase, it is critical...

Download PDF file
  • EP ID EP650686
  • DOI 10.24297/ijct.v14i4.1963
  • Views 74
  • Downloads 0

How To Cite

AJAYI ADEBOWALE, NICULAE GOGA, OTUSILE OLUWABUKOLA, ABEL SAMUEL (2015). Formal Methods in Information Security. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 14(4), 5621-5631. https://europub.co.uk/articles/-A-650686