Contextualizing formal verification for systems security engineering
While formal methods are recognized as means to establish the trustworthiness of systems, their practical adoption for verifying system-level security is limited. By reflecting on system development approaches, we identify and exemplify pertinent challenges and suggest directions to facilitate the e...
Asıl Yazarlar: | , |
---|---|
Materyal Türü: | Journal article |
Dil: | English |
Baskı/Yayın Bilgisi: |
IEEE
2024
|
_version_ | 1826316937881190400 |
---|---|
author | Shaked, A Melham, T |
author_facet | Shaked, A Melham, T |
author_sort | Shaked, A |
collection | OXFORD |
description | While formal methods are recognized as means to establish the trustworthiness of systems, their practical adoption for verifying system-level security is limited. By reflecting on system development approaches, we identify and exemplify pertinent challenges and suggest directions to facilitate the effective, scalable use of formal methods when designing systems. |
first_indexed | 2025-02-19T04:30:43Z |
format | Journal article |
id | oxford-uuid:e05e2c8c-be27-4f32-b4ee-f019c434792f |
institution | University of Oxford |
language | English |
last_indexed | 2025-02-19T04:30:43Z |
publishDate | 2024 |
publisher | IEEE |
record_format | dspace |
spelling | oxford-uuid:e05e2c8c-be27-4f32-b4ee-f019c434792f2024-12-20T12:02:00ZContextualizing formal verification for systems security engineeringJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:e05e2c8c-be27-4f32-b4ee-f019c434792fEnglishSymplectic ElementsIEEE2024Shaked, AMelham, TWhile formal methods are recognized as means to establish the trustworthiness of systems, their practical adoption for verifying system-level security is limited. By reflecting on system development approaches, we identify and exemplify pertinent challenges and suggest directions to facilitate the effective, scalable use of formal methods when designing systems. |
spellingShingle | Shaked, A Melham, T Contextualizing formal verification for systems security engineering |
title | Contextualizing formal verification for systems security engineering |
title_full | Contextualizing formal verification for systems security engineering |
title_fullStr | Contextualizing formal verification for systems security engineering |
title_full_unstemmed | Contextualizing formal verification for systems security engineering |
title_short | Contextualizing formal verification for systems security engineering |
title_sort | contextualizing formal verification for systems security engineering |
work_keys_str_mv | AT shakeda contextualizingformalverificationforsystemssecurityengineering AT melhamt contextualizingformalverificationforsystemssecurityengineering |