[irtf-discuss] formal methods in Internet research

Buday Gergely <buday.gergely.istvan@uni-mate.hu> Tue, 29 June 2021 09:06 UTC

Return-Path: <buday.gergely.istvan@uni-mate.hu>
X-Original-To: irtf-discuss@ietfa.amsl.com
Delivered-To: irtf-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 842BC3A2C19 for <irtf-discuss@ietfa.amsl.com>; Tue, 29 Jun 2021 02:06:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=uni-mate.hu header.b=BogZjoh3; dkim=pass (1024-bit key) header.d=uni-mate.hu header.b=BogZjoh3
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sVuX_p7wYZ-c for <irtf-discuss@ietfa.amsl.com>; Tue, 29 Jun 2021 02:06:26 -0700 (PDT)
Received: from mx1.szie.hu (mx1.szie.hu [192.188.242.66]) by ietfa.amsl.com (Postfix) with ESMTP id 3AD953A2C18 for <irtf-discuss@irtf.org>; Tue, 29 Jun 2021 02:06:26 -0700 (PDT)
Received: from webmail.ih.szie.hu (wmail.ih.szie.hu [192.188.242.48]) by mx1.szie.hu (Postfix) with ESMTP id 4GDdrJ2vx6z2f for <irtf-discuss@irtf.org>; Tue, 29 Jun 2021 11:06:24 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uni-mate.hu; s=uni-mate; t=1624957584; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=4O28Lpwe8t9fHJb8x4c8V5SChR23gXUyQckH/djCjX8=; b=BogZjoh3fxH6JNf87B5MFnh1Fo/ynsSZFfY6f5x2wRpOvDZC8Y8yUbspF246A0jqZM7sgN Ag6O2t57MhEAgPdYymbe37cs/9j5NOWVvJEny+looAocM37dFu7N+ZbNB+ao7RdRv/B+Fb FaHuP09dfc5TyXq3HWgWMIIBuEbpFzw=
Received: from [IPv6:2001:738:5800:6002:8415:13f6:9f5e:bd64] (unknown [IPv6:2001:738:5800:6002:8415:13f6:9f5e:bd64]) by webmail.ih.szie.hu (Postfix) with ESMTPSA id 32F3A14005E for <irtf-discuss@irtf.org>; Tue, 29 Jun 2021 11:06:24 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uni-mate.hu; s=uni-mate; t=1624957584; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=4O28Lpwe8t9fHJb8x4c8V5SChR23gXUyQckH/djCjX8=; b=BogZjoh3fxH6JNf87B5MFnh1Fo/ynsSZFfY6f5x2wRpOvDZC8Y8yUbspF246A0jqZM7sgN Ag6O2t57MhEAgPdYymbe37cs/9j5NOWVvJEny+looAocM37dFu7N+ZbNB+ao7RdRv/B+Fb FaHuP09dfc5TyXq3HWgWMIIBuEbpFzw=
To: irtf-discuss@irtf.org
From: Buday Gergely <buday.gergely.istvan@uni-mate.hu>
Message-ID: <0cad2b0c-7a64-27df-df31-8159f95891ba@uni-mate.hu>
Date: Tue, 29 Jun 2021 11:06:23 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-2; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: hu
Archived-At: <https://mailarchive.ietf.org/arch/msg/irtf-discuss/_06g4aFnJPTyN76V_HNyfxe02gc>
Subject: [irtf-discuss] formal methods in Internet research
X-BeenThere: irtf-discuss@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IRTF general and new-work discussion list <irtf-discuss.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/irtf-discuss>, <mailto:irtf-discuss-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/irtf-discuss/>
List-Post: <mailto:irtf-discuss@irtf.org>
List-Help: <mailto:irtf-discuss-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/irtf-discuss>, <mailto:irtf-discuss-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Jun 2021 09:07:56 -0000

Hi there,

these days formal methods play a definite role in building secure 
systems. Especially, using theorem provers to model protocols, operating 
systems and compilers.

Which of the Internet Research Task Force research groups considers this 
area for use? Or, would it be reasonable to create one solely for this?

Best

Gergely Buday