• Dec 30, 2021 News!Vol.13, No.1 & Vol.13, No.2 have been indexed by Inspec.   [Click]
  • Mar 29, 2022 News!IJCTE Vol.14, No.2 has been published.   [Click]
  • Jan 28, 2022 News!IJCTE had implemented online submission system   [Click]
General Information
Prof. Mehmet Sahinoglu
Faculty at Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2012 Vol.4(5): 740-744 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2012.V4.569

Automatic Proof of Survivability Compliance –Approaches and Techniques

Yanjun Zuo
Abstract—Survivability represents a system’s capability to withstand malicious attacks and system failures in order to provide essential services to users even in a challenging environment. In a proof-carrying paradigm, a user publishes his/her survivability requirement policy and a system provider constructs a proof that the system satisfies the user’s requirements. Finally, the user verifies if the proof is valid. In this paper, we discuss proof approaches and techniques used by the system provider to automatically compile such a proof. We develop algorithms to show how different proof choices are generated so that the system provider can choose the most cost-efficient approach in the proof process. Proof generation relies on the certifications generated by trusted evaluators. We show the necessary steps to construct the basic proof elements which can be logically linked to form the ultimate proof.

Index Terms—Algorithm, proof, survivability, verification.

Yanjun Zuo is with the University of North Dakota, Grand Forks, ND, USA 58201.


Cite: Yanjun Zuo, "Automatic Proof of Survivability Compliance –Approaches and Techniques," International Journal of Computer Theory and Engineering vol. 4, no. 5, pp.  740-744, 2012.

Copyright © 2008-2022. International Association of Computer Science and Information Technology. All rights reserved.