Analysis of security protocols as open systems

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of security protocols as open systems

We propose a methodology for the formal analysis of security protocols. This originates from the observation that the verification of security protocols can be conveniently treated as the verification of open systems, i.e. systems which may have unspecified components. These might be used to represent a hostile environment wherein the protocol runs and whose behavior cannot be predicted a prior...

متن کامل

LK-INTERIOR SYSTEMS AS SYSTEMS OF “ALMOST OPEN” L-SETS

We study interior operators and interior structures in a fuzzy setting.We investigate systems of “almost open” fuzzy sets and the relationshipsto fuzzy interior operators and fuzzy interior systems.

متن کامل

Security Analysis of Open Building Automation Systems

With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on physically isolated networks and on “Security by Obscurity”, as it is still common today, is by no means an adequate solution. To be reliable and robust against malicious manipulations, the used communication services must sup...

متن کامل

Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification

Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the security-related and cryptographic protocols used over open networks and distributed systems. The most commonly followed techniques for the application of formal methods for the ex-post analysis and verification of cryptographic protocols, as the analysis approach, are reviewed, followed by the ex...

متن کامل

Analysis of security protocols for authentication in distributed systems

Research works on the analysis and the development of authentication protocols frequently adopt the linear software development approach and are based on certain non-extensible assumptions (Tobler and Hutchison 2004), (Grob 2003), (Harbitter and Menasce 2002). This paper is part of an ongoing work regarding the development of a pre-emptive security mechanism for networks and distributed systems...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 2003

ISSN: 0304-3975

DOI: 10.1016/s0304-3975(02)00596-0