Skip to main content

Formal Methods and Security Evaluation

  • Conference paper
  • First Online:
Theorem Proving in Higher Order Logics (TPHOLs 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1690))

Included in the following conference series:

  • 443 Accesses

Abstract

Formal methods have long been recognised as central to the development of secure system. Formal models of security policy and formal verification of cryptographic protocols have shown to be very useful to the development of real systems. But many new and promising research results in the area of security protocol verification, security architecture, or mobile code analysis, are still to be shown for practibility.

Quite recently the United States,United Kingdom,Germany,France, Canada, and the Netherlands released a jointly developed evaluation standard usually referred to as the “Common Criteria” (CC). This standard is to replace two earlier security standards: the american TCSEC and the european ITSEC.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bolignano, D. (1999). Formal Methods and Security Evaluation. In: Bertot, Y., Dowek, G., Théry, L., Hirschowitz, A., Paulin, C. (eds) Theorem Proving in Higher Order Logics. TPHOLs 1999. Lecture Notes in Computer Science, vol 1690. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48256-3_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-48256-3_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66463-5

  • Online ISBN: 978-3-540-48256-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics