equal
deleted
inserted
replaced
181 |
181 |
182 \draw[red, ->, line width = 2mm] (1.7,1) -- (2.7,1); |
182 \draw[red, ->, line width = 2mm] (1.7,1) -- (2.7,1); |
183 \draw[red,<-, line width = 2mm] (-0.6,1) -- (-1.6,1); |
183 \draw[red,<-, line width = 2mm] (-0.6,1) -- (-1.6,1); |
184 \draw[red, <-, line width = 3mm] (0.6,2.2) -- (0.6,3.2); |
184 \draw[red, <-, line width = 3mm] (0.6,2.2) -- (0.6,3.2); |
185 |
185 |
186 \draw (0.6,4) node {\begin{tabular}{l}\large Some Rules\\(access policy)\end{tabular}}; |
186 \draw (0.6,4) node {\begin{tabular}{l}\large some rules\\(access policy)\end{tabular}}; |
187 |
187 |
188 \end{tikzpicture} |
188 \end{tikzpicture} |
189 \end{center} |
189 \end{center} |
190 |
190 |
191 \end{frame}} |
191 \end{frame}} |
200 Ross Anderson about the use of Logic:\bigskip |
200 Ross Anderson about the use of Logic:\bigskip |
201 |
201 |
202 \begin{quote} |
202 \begin{quote} |
203 Formal methods can be an excellent way of finding |
203 Formal methods can be an excellent way of finding |
204 bugs in security protocol designs as they force the designer |
204 bugs in security protocol designs as they force the designer |
205 to make everything explicit and thus confront difficult design |
205 to make everything explicit and thus confront dif$\!$ficult design |
206 choices that might otherwise be fudged. |
206 choices that might otherwise be fudged. |
207 \end{quote} |
207 \end{quote} |
208 |
208 |
209 \end{frame}} |
209 \end{frame}} |
210 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
210 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
223 |
223 |
224 \draw[red, ->, line width = 2mm] (1.7,1) -- (2.7,1); |
224 \draw[red, ->, line width = 2mm] (1.7,1) -- (2.7,1); |
225 \draw[red,<-, line width = 2mm] (-0.6,1) -- (-1.6,1); |
225 \draw[red,<-, line width = 2mm] (-0.6,1) -- (-1.6,1); |
226 \draw[red, <-, line width = 3mm] (0.6,2.2) -- (0.6,3.2); |
226 \draw[red, <-, line width = 3mm] (0.6,2.2) -- (0.6,3.2); |
227 |
227 |
228 \draw (0.6,3.7) node {\begin{tabular}{l}Access Policy\end{tabular}}; |
228 \draw (0.6,3.7) node {\begin{tabular}{l}access policy\end{tabular}}; |
229 |
229 |
230 \end{tikzpicture} |
230 \end{tikzpicture} |
231 \end{center} |
231 \end{center} |
232 |
232 |
233 Assuming one file on my computer contains a virus.\smallskip\\ |
233 Assuming one file on my computer contains a virus.\smallskip\\ |
1232 |
1232 |
1233 \end{frame}} |
1233 \end{frame}} |
1234 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1234 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1235 % |
1235 % |
1236 |
1236 |
|
1237 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1238 \mode<presentation>{ |
|
1239 \begin{frame}[c] |
|
1240 \frametitle{Point to Take Home} |
|
1241 |
|
1242 \begin{itemize} |
|
1243 \item Formal methods can be an excellent way of finding |
|
1244 bugs as they force the designer |
|
1245 to make everything explicit and thus confront dif$\!$ficult design |
|
1246 choices that might otherwise be fudged. |
|
1247 \end{itemize} |
|
1248 |
|
1249 \end{frame}} |
|
1250 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1251 |
1237 |
1252 |
1238 |
1253 |
1239 \end{document} |
1254 \end{document} |
1240 |
1255 |
1241 %%% Local Variables: |
1256 %%% Local Variables: |