Papers Using Logical Methods in Information Security

Protocol Analysis Fundamentals (covered briefly by instructor)

1. Protocol Analysis Using Logic Programming

2. Attack Graph Generation

3. Using Decision Diagrams for Analyzing Firewall Policies

4. Policy Change Impact Analysis

5. Policy Analysis in Trust Management

6. RBAC Policy Analysis

7. Program Analysis

8. SELinux Policy Analysis

9. Privacy Policies

10. Access Control Policy Integration

11. Obligation Policies


Application of Fuzzy Logic to Security