slides05.tex
changeset 53 6c81e42e539d
parent 52 be19f8a1fcf0
child 54 6986cd4261f2
equal deleted inserted replaced
52:be19f8a1fcf0 53:6c81e42e539d
   181  
   181  
   182   \draw[red, ->, line width = 2mm] (1.7,1) -- (2.7,1); 
   182   \draw[red, ->, line width = 2mm] (1.7,1) -- (2.7,1); 
   183   \draw[red,<-, line width = 2mm] (-0.6,1) -- (-1.6,1);
   183   \draw[red,<-, line width = 2mm] (-0.6,1) -- (-1.6,1);
   184   \draw[red, <-, line width = 3mm] (0.6,2.2) -- (0.6,3.2); 
   184   \draw[red, <-, line width = 3mm] (0.6,2.2) -- (0.6,3.2); 
   185   
   185   
   186   \draw (0.6,4) node {\begin{tabular}{l}\large Some Rules\\(access policy)\end{tabular}};
   186   \draw (0.6,4) node {\begin{tabular}{l}\large some rules\\(access policy)\end{tabular}};
   187 
   187 
   188   \end{tikzpicture}
   188   \end{tikzpicture}
   189 \end{center}
   189 \end{center}
   190 
   190 
   191 \end{frame}}
   191 \end{frame}}
   200 Ross Anderson about the use of Logic:\bigskip
   200 Ross Anderson about the use of Logic:\bigskip
   201 
   201 
   202 \begin{quote}
   202 \begin{quote}
   203 Formal methods can be an excellent way of finding 
   203 Formal methods can be an excellent way of finding 
   204 bugs in security protocol designs as they force the designer 
   204 bugs in security protocol designs as they force the designer 
   205 to make everything explicit and thus confront difficult design 
   205 to make everything explicit and thus confront dif$\!$ficult design 
   206 choices that might otherwise be fudged. 
   206 choices that might otherwise be fudged. 
   207 \end{quote}
   207 \end{quote}
   208 
   208 
   209 \end{frame}}
   209 \end{frame}}
   210 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   210 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   223  
   223  
   224   \draw[red, ->, line width = 2mm] (1.7,1) -- (2.7,1); 
   224   \draw[red, ->, line width = 2mm] (1.7,1) -- (2.7,1); 
   225   \draw[red,<-, line width = 2mm] (-0.6,1) -- (-1.6,1);
   225   \draw[red,<-, line width = 2mm] (-0.6,1) -- (-1.6,1);
   226   \draw[red, <-, line width = 3mm] (0.6,2.2) -- (0.6,3.2); 
   226   \draw[red, <-, line width = 3mm] (0.6,2.2) -- (0.6,3.2); 
   227   
   227   
   228   \draw (0.6,3.7) node {\begin{tabular}{l}Access Policy\end{tabular}};
   228   \draw (0.6,3.7) node {\begin{tabular}{l}access policy\end{tabular}};
   229 
   229 
   230   \end{tikzpicture}
   230   \end{tikzpicture}
   231 \end{center}
   231 \end{center}
   232 
   232 
   233 Assuming one file on my computer contains a virus.\smallskip\\
   233 Assuming one file on my computer contains a virus.\smallskip\\
  1232 
  1232 
  1233   \end{frame}}
  1233   \end{frame}}
  1234   %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  1234   %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  1235 %
  1235 %
  1236 
  1236 
       
  1237 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
  1238 \mode<presentation>{
       
  1239 \begin{frame}[c]
       
  1240 \frametitle{Point to Take Home}
       
  1241 
       
  1242 \begin{itemize}
       
  1243 \item Formal methods can be an excellent way of finding 
       
  1244 bugs as they force the designer 
       
  1245 to make everything explicit and thus confront dif$\!$ficult design 
       
  1246 choices that might otherwise be fudged. 
       
  1247 \end{itemize}
       
  1248 
       
  1249 \end{frame}}
       
  1250 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
  1251 
  1237 
  1252 
  1238 
  1253 
  1239 \end{document}
  1254 \end{document}
  1240 
  1255 
  1241 %%% Local Variables:  
  1256 %%% Local Variables: