Abstract
Formal methods have long been recognised as central to the development of secure system. Formal models of security policy and formal verification of cryptographic protocols have shown to be very useful to the development of real systems. But many new and promising research results in the area of security protocol verification, security architecture, or mobile code analysis, are still to be shown for practibility.
Quite recently the United States,United Kingdom,Germany,France, Canada, and the Netherlands released a jointly developed evaluation standard usually referred to as the “Common Criteria” (CC). This standard is to replace two earlier security standards: the american TCSEC and the european ITSEC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bolignano, D. (1999). Formal Methods and Security Evaluation. In: Bertot, Y., Dowek, G., Théry, L., Hirschowitz, A., Paulin, C. (eds) Theorem Proving in Higher Order Logics. TPHOLs 1999. Lecture Notes in Computer Science, vol 1690. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48256-3_19
Download citation
DOI: https://doi.org/10.1007/3-540-48256-3_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66463-5
Online ISBN: 978-3-540-48256-7
eBook Packages: Springer Book Archive