hws/hw07.tex
changeset 139 059527f0615a
parent 137 6fc7de0f23ba
child 306 c3ad0cf9db50
equal deleted inserted replaced
138:86d1e2e6c211 139:059527f0615a
    20 \mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}}
    20 \mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}}
    21 \end{center}
    21 \end{center}
    22 
    22 
    23 for constructing a proof of the judgement. What do the premises look like? 
    23 for constructing a proof of the judgement. What do the premises look like? 
    24 
    24 
       
    25 \item What are the benefits of using Logic to describe protocols and access control problems?
       
    26 
       
    27 
    25 %\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
    28 %\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
    26 %$Q$'. Give a definition for this formula in terms of $\textit{says}$.
    29 %$Q$'. Give a definition for this formula in terms of $\textit{says}$.
    27 
    30 
    28 %\item In Unix, what should be the general architecture of a network application that 
    31 %\item In Unix, what should be the general architecture of a network application that 
    29 %processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix
    32 %processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix