The Use of Formal Methods in the Analysis of Trust (Position Paper)
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for modern computing systems. Security has been studied thoroughly for many years, particularly the sub-domain of cryptography. The use of computing science formal methods has facilitated cryptanalysis of security protocols. At the moment, trust is intensively studied, but not well understood. Here we present our approach based on formal methods for modelling and validating the notion of trust in computing science.
trust analysis, formal methods, B method, UML, U2B, UML-B, ProB
333-339
Butler, Michael
54b9c2c7-2574-438e-9a36-6842a3d53ed0
Leuschel, Michael
c2c18572-66cf-4f84-ade4-218ce3afe78b
Lo Presti, Stephane
69286343-e012-4a66-bde9-82667af4a6f4
Turner, Phillip
fc602874-84e8-4e44-a5b1-fbd5fba36be3
Jensen, Christian
9792dbb8-0483-4f74-a3a6-1f093985ead5
Poslad, Stefan
fad30231-02aa-46ee-b9fc-3742f206b419
Dimitrakos, Theo
0d120d3e-d90f-4a76-bcfb-684de37b11da
2004
Butler, Michael
54b9c2c7-2574-438e-9a36-6842a3d53ed0
Leuschel, Michael
c2c18572-66cf-4f84-ade4-218ce3afe78b
Lo Presti, Stephane
69286343-e012-4a66-bde9-82667af4a6f4
Turner, Phillip
fc602874-84e8-4e44-a5b1-fbd5fba36be3
Jensen, Christian
9792dbb8-0483-4f74-a3a6-1f093985ead5
Poslad, Stefan
fad30231-02aa-46ee-b9fc-3742f206b419
Dimitrakos, Theo
0d120d3e-d90f-4a76-bcfb-684de37b11da
Butler, Michael, Leuschel, Michael, Lo Presti, Stephane and Turner, Phillip
(2004)
The Use of Formal Methods in the Analysis of Trust (Position Paper).
Jensen, Christian, Poslad, Stefan and Dimitrakos, Theo
(eds.)
Second International Conference on Trust Management (iTrust 2004), Oxford, United Kingdom.
01 Mar - 29 Apr 2004.
.
Record type:
Conference or Workshop Item
(Paper)
Abstract
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for modern computing systems. Security has been studied thoroughly for many years, particularly the sub-domain of cryptography. The use of computing science formal methods has facilitated cryptanalysis of security protocols. At the moment, trust is intensively studied, but not well understood. Here we present our approach based on formal methods for modelling and validating the notion of trust in computing science.
Text
itrust04.pdf
- Other
More information
Published date: 2004
Additional Information:
Event Dates: March 29 - April 1st 2004
Venue - Dates:
Second International Conference on Trust Management (iTrust 2004), Oxford, United Kingdom, 2004-03-01 - 2004-04-29
Keywords:
trust analysis, formal methods, B method, UML, U2B, UML-B, ProB
Organisations:
Electronic & Software Systems
Identifiers
Local EPrints ID: 258770
URI: http://eprints.soton.ac.uk/id/eprint/258770
PURE UUID: b8fccbfe-0b19-4fd1-a8f6-352ac402a1d4
Catalogue record
Date deposited: 19 Jan 2004
Last modified: 15 Mar 2024 02:50
Export record
Contributors
Author:
Michael Butler
Author:
Michael Leuschel
Author:
Stephane Lo Presti
Author:
Phillip Turner
Editor:
Christian Jensen
Editor:
Stefan Poslad
Editor:
Theo Dimitrakos
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics