2021
DOI: 10.1007/s10817-021-09602-2
|View full text |Cite
|
Sign up to set email alerts
|

An Automatically Verified Prototype of the Tokeneer ID Station Specification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

4
4

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 31 publications
1
12
0
Order By: Relevance
“…Then, Mammar and Leleau had to work out 80 proof obligations interactively in spite of Roding using external provers such as Atelier B and SMT solvers. The figures obtained with {log} for the LGS are aligned with previous results concerning the verification of a {log} prototype of the Tokeneer ID Station written from a Z specification [20] and the verification of the Bell-LaPadula security model [19].…”
Section: Encoding Proof Obligations In {Log}supporting
confidence: 81%
See 2 more Smart Citations
“…Then, Mammar and Leleau had to work out 80 proof obligations interactively in spite of Roding using external provers such as Atelier B and SMT solvers. The figures obtained with {log} for the LGS are aligned with previous results concerning the verification of a {log} prototype of the Tokeneer ID Station written from a Z specification [20] and the verification of the Bell-LaPadula security model [19].…”
Section: Encoding Proof Obligations In {Log}supporting
confidence: 81%
“…All these procedures are integrated into a single solver, implemented in Prolog, which constitutes the core part of the {log} tool. Several in-depth empirical evaluations provide evidence that {log} is able to solve non-trivial problems [13][14][15]18]; in particular as an automated verifier of security properties [19,20].…”
Section: Overview Of {Log}mentioning
confidence: 99%
See 1 more Smart Citation
“…All these procedures are integrated into a single solver, implemented in Prolog, which constitutes the core part of the {log} tool. Several in-depth empirical evaluations provide evidence that {log} is able to solve non-trivial problems [CR20b,CR18,CR17,CRF13]; in particular as an automated verifier of security properties [CR21a,CR20a].…”
Section: {Log}mentioning
confidence: 99%
“…The limitation of L BR to finite sets is not so severe as many programs operate only on finite data structures. Therefore, L BR can be used as a specification language for a large class of software systems and {log} as a tool to reason about them [31,34,35,30,32].…”
Section: The {Log} Languagementioning
confidence: 99%