equal
deleted
inserted
replaced
20 \mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}} |
20 \mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}} |
21 \end{center} |
21 \end{center} |
22 |
22 |
23 for constructing a proof of the judgement. What do the premises look like? |
23 for constructing a proof of the judgement. What do the premises look like? |
24 |
24 |
|
25 \item What are the benefits of using Logic to describe protocols and access control problems? |
|
26 |
|
27 |
25 %\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for |
28 %\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for |
26 %$Q$'. Give a definition for this formula in terms of $\textit{says}$. |
29 %$Q$'. Give a definition for this formula in terms of $\textit{says}$. |
27 |
30 |
28 %\item In Unix, what should be the general architecture of a network application that |
31 %\item In Unix, what should be the general architecture of a network application that |
29 %processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix |
32 %processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix |