• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
  • Jun 14, 2017 News!Vol.9, No.3 has been published with online version. 15 peer reviewed articles from 8 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2012 Vol.4(5): 740-744 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2012.V4.569

Automatic Proof of Survivability Compliance –Approaches and Techniques

Yanjun Zuo
Abstract—Survivability represents a system’s capability to withstand malicious attacks and system failures in order to provide essential services to users even in a challenging environment. In a proof-carrying paradigm, a user publishes his/her survivability requirement policy and a system provider constructs a proof that the system satisfies the user’s requirements. Finally, the user verifies if the proof is valid. In this paper, we discuss proof approaches and techniques used by the system provider to automatically compile such a proof. We develop algorithms to show how different proof choices are generated so that the system provider can choose the most cost-efficient approach in the proof process. Proof generation relies on the certifications generated by trusted evaluators. We show the necessary steps to construct the basic proof elements which can be logically linked to form the ultimate proof.

Index Terms—Algorithm, proof, survivability, verification.

Yanjun Zuo is with the University of North Dakota, Grand Forks, ND, USA 58201.

[PDF]

Cite: Yanjun Zuo, "Automatic Proof of Survivability Compliance –Approaches and Techniques," International Journal of Computer Theory and Engineering vol. 4, no. 5, pp.  740-744, 2012.
Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com