Proof of Logic: Correctness of Next Generation Security Mechanisms

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 9, Issue 1

Abstract

In this paper, three security mechanisms developed to form the UDT (UDP-Data Transfer protocol) Security Architecture are evaluated and analyzed. An approach is utilized to ascertain the applicability and secrecy properties of the selected security mechanisms when implemented with UDT. In this approach, a formal proof of correctness, through formal composition logic is carried out. This approach is modular; it has a separate proof for each protocol section that provides insight into the network environment in which each section can be reliably employed. Moreover, the proof holds for a variety of failure recovery strategies and other implementation and configuration options.This paper is an  extension and a revised version of the works published by the author.

Authors and Affiliations

Danilo Valeros Bernardo

Keywords

Related Articles

On multi-objective linear programming problems with inexact rough interval-fuzzy coefficients

This paper deals with a multi-objective linear programming problem with an inexact rough interval fuzzy coefficients IRFMOLP. This problem is considered by incorporating an inexact rough interval fuzzy number in both the...

Fuzzy Logic Based Advance Speed Control of Induction Motor

The speed control of Induction motor is done using the advance AI Technique methods. In this System the vector control scheme in the stator flux oriented reference frame is used for controlling the variable speed Inducti...

Performance Comparison Between Various Tuning Strategies: Ciancone, Cohen Coon & Ziegler- Nicholas Tuning Methods

This paper, explains about the background study of the coupled tank and to model such tanks using Simulink blocks. It must explains, the coupled tanks are used to select the best tuning strategy for PID controller based...

Fuzzy Weighted Ordered Weighted Average-Gaussian Mixture Model for Feature Reduction

Feature reduction finds the optimal feature subset using machine learning techniques and evaluation criteria. Some of the irrelevant features are existed in the real-world datasets that should be removed by using the mul...

Fangled Protocol for Black Hole Detection in Ad Hoc Networks

Now a day, security in Mobile Ad hoc Network is very important issue. Due to dynamic topology and mobility of nodes, Mobile Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless net...

Download PDF file
  • EP ID EP650152
  • DOI 10.24297/ijct.v9i1.4156
  • Views 91
  • Downloads 0

How To Cite

Danilo Valeros Bernardo (2013). Proof of Logic: Correctness of Next Generation Security Mechanisms. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 9(1), 964-975. https://europub.co.uk/articles/-A-650152