hws/hw07.tex
author Christian Urban <christian dot urban at kcl dot ac dot uk>
Tue, 26 Nov 2013 06:33:31 +0000
changeset 139 059527f0615a
parent 137 6fc7de0f23ba
child 306 c3ad0cf9db50
permissions -rw-r--r--
added

\documentclass{article}
\usepackage{charter}
\usepackage{hyperref}
\usepackage{amssymb}
\usepackage{proof}

\begin{document}

\section*{Homework 7}

\begin{enumerate}
\item Suppose a judgement is of the form:
\begin{center}
$Alice\;\textit{says}\;S \wedge Bob\;\textit{says}\;S \vdash Bob\;\textit{says}\;S \wedge Alice\;\textit{says}\;S$
\end{center}

Assume you want to use the inference rule

\begin{center}
\mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}}
\end{center}

for constructing a proof of the judgement. What do the premises look like? 

\item What are the benefits of using Logic to describe protocols and access control problems?


%\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
%$Q$'. Give a definition for this formula in terms of $\textit{says}$.

%\item In Unix, what should be the general architecture of a network application that 
%processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix
%you can give different privileges to processes.)

%\item Explain what are the differences between dictionary and brute forcing attacks  against  passwords.

\end{enumerate}
\end{document}

%%% Local Variables: 
%%% mode: latex
%%% TeX-master: t
%%% End: