Higher Order Logic Theorem Proving and its Applications

Higher Order Logic Theorem Proving and its Applications PDF

Author: L.J.M. Claesen

Publisher: Elsevier

Published: 2014-05-23

Total Pages: 588

ISBN-13: 148329840X

DOWNLOAD EBOOK →

The HOL system is a higher order logic theorem proving system implemented at Edinburgh University, Cambridge University and INRIA. Its many applications, from the verification of hardware designs at all levels to the verification of programs and communication protocols are considered in depth in this volume. Other systems based on higher order logic, namely Nuprl and LAMBDA are also discussed. Features given particular consideration are: novel developments in higher order logic and its implementations in HOL; formal design and verification methodologies for hardware and software; public domain availability of the HOL system. Papers addressing these issues have been divided as follows: Mathematical Logic; Induction; General Modelling and Proofs; Formalizing and Modelling of Automata; Program Verification; Hardware Description Language Semantics; Hardware Verification Methodologies; Simulation in Higher Order Logic; Extended Uses of Higher Order Logic. Academic and industrial researchers involved in formal hardware and software design and verification methods should find the publication especially interesting and it is hoped it will also provide a useful reference tool for those working at software institutes and within the electronics industries.

Towards a Formal Verification of a Secure and Distributed System and Its Applications

Towards a Formal Verification of a Secure and Distributed System and Its Applications PDF

Author:

Publisher:

Published: 1994

Total Pages: 12

ISBN-13:

DOWNLOAD EBOOK →

This paper presents research towards the formal specification and verification of a secure distributed system and secure application programs that run on it. We refer to the whole system from hardware to application programs written in a concurrent programming language as the Silo and to a simplified view of the Silo as the minisilo. Both minisilo and Silo consist of a collection of microprocessors interconnected by a network a distributed operating, system and a compiler for a distributed programming language. Our goal is to verify the full Silo by mechanized layered formal proof using the higher order logic theorem proving system HOL. This paper describes our current results for verifying the minisilo and our incremental approach for evolving the verification of the minisilo into the verification of the full Silo. Scalability is addressed in part - extending, the distributed operating, system with additional server which in turn provide services that extend the programming language.

Specification and Verification of Secure Concurrent and Distributed Software Systems

Specification and Verification of Secure Concurrent and Distributed Software Systems PDF

Author:

Publisher:

Published: 1992

Total Pages: 277

ISBN-13:

DOWNLOAD EBOOK →

This report describes an investigation of techniques to support the specification and verification of concurrent and distributed software systems, with special emphasis on issues of security. The investigation has focused on two major areas. The primary focus is a survey of existing methodologies and systems that are relevant to the specification and verification of concurrency. The secondary focus is on the initial design of a short-term workbench that embodies capabilities of existing systems together with new features that extend the current state of the art in the specification and verification of concurrency. The introduction to the report summarizes survey results and presents overall conclusions about the current state of the art. Sections 2 and 3 of the report present the details of the methodology and system surveys respectively. The surveys include high level feature comparison tables accompanied by extended reviews. Section 4 describes a design for the short-term workbench that will support computer-aided specification and verification. Section 5 describes a set of extended examples that were developed to test the design ideas. Section 6 concludes with an overall summary and an overview of targets for future work.

Proceedings

Proceedings PDF

Author:

Publisher: IEEE Computer Society

Published: 1991

Total Pages: 389

ISBN-13: 9780818621680

DOWNLOAD EBOOK →

Proceedings of the 1991 IEEE Computer Society Symposium on [title], held in Oakland, California, May 1991. Focusing on both theoretical and practical research in computer security, the subjects addressed include covert channels, security models, distributed systems, protocol verification, policy, authentication, information theory, database security, and intrusion detection. No index. Acidic paper. Annotation copyrighted by Book News, Inc., Portland, OR.

Database Security X

Database Security X PDF

Author: Pierangela Samarati

Publisher: Springer

Published: 2016-01-09

Total Pages: 308

ISBN-13: 0387351671

DOWNLOAD EBOOK →

The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge. The book brings together contributions from experts in the field throughout the world. Database security is still a key topic in mist businesses and in the public sector, having implications for the whole of society.

Stabilization, Safety, and Security of Distributed Systems

Stabilization, Safety, and Security of Distributed Systems PDF

Author: Shlomi Dolev

Publisher: Springer Science & Business Media

Published: 2010-09-09

Total Pages: 619

ISBN-13: 3642160220

DOWNLOAD EBOOK →

This book constitutes the refereed proceedings of the 12th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2010, held in New York, USA, in September 2010. The 39 revised full papers were carefully reviewed and selected from 90 submissions. The papers address all safety and security-related aspects of self-stabilizing systems in various areas. The most topics related to self-* systems. The tracks were: self-stabilization; self-organization; ad-hoc, sensor, and dynamic networks; peer to peer; fault-tolerance and dependable systems; safety and verification; swarm, amorphous, spatial, and complex systems; security; cryptography, and discrete distributed algorithms.

Higher Order Logic Theorem Proving and Its Applications

Higher Order Logic Theorem Proving and Its Applications PDF

Author: Luc J. M. Claesen

Publisher:

Published: 1993

Total Pages: 594

ISBN-13:

DOWNLOAD EBOOK →

The HOL system is a higher order logic theorem proving system implemented at Edinburgh University, Cambridge University and INRIA. Its many applications, from the verification of hardware designs at all levels to the verification of programs and communication protocols are considered in depth in this volume. Other systems based on higher order logic, namely Nuprl and LAMBDA are also discussed. Features given particular consideration are: novel developments in higher order logic and its implementations in HOL; formal design and verification methodologies for hardware and software; public domain availability of the HOL system. Papers addressing these issues have been divided as follows: Mathematical Logic; Induction; General Modelling and Proofs; Formalizing and Modelling of Automata; Program Verification; Hardware Description Language Semantics; Hardware Verification Methodologies; Simulation in Higher Order Logic; Extended Uses of Higher Order Logic. Academic and industrial researchers involved in formal hardware and software design and verification methods should find the publication especially interesting and it is hoped it will also provide a useful reference tool for those working at software institutes and within the electronics industries.