hws/hw07.tex
changeset 97 efcac3016613
parent 74 fb14a8e1b00d
child 137 6fc7de0f23ba
equal deleted inserted replaced
96:e1e314c1bb61 97:efcac3016613
       
     1 \documentclass{article}
       
     2 \usepackage{charter}
       
     3 \usepackage{hyperref}
       
     4 \usepackage{amssymb}
       
     5 \usepackage{proof}
       
     6 
       
     7 \begin{document}
       
     8 
       
     9 \section*{Homework 7}
       
    10 
       
    11 \begin{enumerate}
       
    12 \item Suppose a judgement is of the form:
       
    13 \begin{center}
       
    14 $Alice\;\textit{says}\;S \wedge Bob\;\textit{says}\;S \vdash Bob\;\textit{says}\;S \wedge Alice\;\textit{says}\;S$
       
    15 \end{center}
       
    16 
       
    17 Assume you want to use the inference rule
       
    18 
       
    19 \begin{center}
       
    20 \mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}}
       
    21 \end{center}
       
    22 
       
    23 for constructing a proof of the judgement. What do the premises look like? 
       
    24 
       
    25 \item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
       
    26 $Q$'. Give a definition for this formula in terms of $\textit{says}$.
       
    27 
       
    28 \item In Unix, what should be the general architecture of a network application that 
       
    29 processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix
       
    30 you can give different privileges to processes.)
       
    31 
       
    32 \item Explain what are the differences between dictionary and brute forcing attacks  against  passwords.
       
    33 
       
    34 \end{enumerate}
       
    35 \end{document}
       
    36 
       
    37 %%% Local Variables: 
       
    38 %%% mode: latex
       
    39 %%% TeX-master: t
       
    40 %%% End: