This question is about using Formal Methods in the development of Trusted Systems Below is a hyperlink to a PDF file entitled: “File systems deserve verification too” found at the following URL: http://www.academia.edu/17825252/File_systems_deserve_verification_too_ by Keller, Murray, Amani, et al. (2013). This paper was first published in the Proceedings of the 7th Workshop on Programming Languages and Operating Systems (PLOS 2013), November 3, 2013, Nemacolin Woodlands Resort, Pennsylvania, USA, November 3, 2013,. As well as in the following Journal: IEEE Security and Privacy Journal Volume 10 Issue 2, March 2013 Pages 67-70. The next hyperlink, below points to a related file in PDF format; entitled: Towards a Verified Component Platform https://ssrg.nicta.com.au/publications/nictaabstracts/7281.pdf by Fernandez, Kuz, & Andronick (2013). This paper was also published in the Proceedings of the 7th Workshop on Programming Languages and Operating Systems (PLOS 2013), 2013, Nemacolin Woodlands Resort, Pennsylvania, USA, November 2013. You will see by the dates that these two (2) papers are representative of contemporary research taking place in the field of Information Communications Technology Security and Trusted Systems. I want to bring your attention to a third very recently published paper for which the details are as follows: It is entitled “Refinement Through Restraint: Bringing Down the Cost of Verification” by Liam O'Connor, Zilin Chen, Christine Rizkallah, Sidney Amani, Japheth Lim, Toby Murray, Yutaka Nagashima, Thomas Sewell, Gerwin Klein and can be found at the following URL: https://www.nicta.com.au/publications/research-publications/? Conference/location: International Conference on Functional Programming, Nara, Japan Conference URL: http://conf.researchr.org/home/icfp-2016 International Conf. on Functional Programming. Question 3 Requirements: You are to choose one of the above three papers (not all three) and analyze: the problem being addressed; the approach taken to arrive at a solution(s), as well as the results to date along with a discussion of anticipated results as we move into the future. Explain what the impact of at least one of these three individual research projects will have on the future of Formal Verification of trusted operating systems and trusted software in general. Provide at least two examples of aspects or areas where we may see improvements in system trust in general as a result of these research projects. Please frame your claims in logical argumentations and referenced research results using the text and credible outside sources (Should be 3-4 pages) Note: – In addressing the question requirements for your chosen paper you may find the following hyperlinked PDF of assistance as it covers some fundamental topics in the domain: “Formalization of a Component Platform” by Fernandez, M., Kuz, I., & Klein, G. (2012). This article was published as Poster Presentation at the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12), 2012, Hollywood, California, USA, October. Question 3 References Keller. G., Murray, T., Amani. S., etal. (2013). File Systems Deserve Verification Too! In, Proceedings of the 7th Workshop on Programming Languages and Operating Systems (PLOS 2013), 2013, Nemacolin Woodlands Resort, Pennsylvania, USA, November. Retrieved from http://www.academia.edu/17825252/File_systems_deserve_verification_too_ Fernandez, M., Kuz, I., & Andronick, J. (2013). Towards a Verified Component Platform. In, Proceedings of the 7th Workshop on Programming Languages and Operating Systems (PLOS 2013), 2013, Nemacolin Woodlands Resort, Pennsylvania, USA, November. Retrieved from https://ssrg.nicta.com.au/publications/nictaabstracts/7281.pdf Fernandez, M., Kuz, I., & Klein, G. (2012). The formalisation of a Component Platform. Published as a Poster Presentation at the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12), 2012, Hollywood, California, USA, October. Retrieved from www.nicta.com.au/pub-download/full/6337/ Please ensure that you have read the entire question and paid close attention to the requirements. Please confirm that you are able to complete this before answering. Also, please cite all work. —
Get a customized solution on this task at emuktask.comHomework Answers on emuktask.com, you can order your academic assignment from one of our 300+ project experts. Hire your expert directly, without overpaying for agencies and affiliates!
POST A QUESTION
EmukTask.com guarantee you peace of mind, gives the value of your money, and trust for us to help you with your assignments. We assure you of original work that meets your academic and project’s needs. We at EmukTask.com have a mark of quality, professionalism, and timely delivery of given projects.
+1 (289) 803-6873
Request a Callback
Drop Us a Line