There is growing public concern about personal data collected by both private and public sectors. People have very little control over what kinds of data are stored and how such da...
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...