Analysis of security protocols as open systems
نویسندگان
چکیده
منابع مشابه
Analysis of security protocols as open systems
We propose a methodology for the formal analysis of security protocols. This originates from the observation that the verification of security protocols can be conveniently treated as the verification of open systems, i.e. systems which may have unspecified components. These might be used to represent a hostile environment wherein the protocol runs and whose behavior cannot be predicted a prior...
متن کاملLK-INTERIOR SYSTEMS AS SYSTEMS OF “ALMOST OPEN” L-SETS
We study interior operators and interior structures in a fuzzy setting.We investigate systems of “almost open” fuzzy sets and the relationshipsto fuzzy interior operators and fuzzy interior systems.
متن کاملSecurity Analysis of Open Building Automation Systems
With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on physically isolated networks and on “Security by Obscurity”, as it is still common today, is by no means an adequate solution. To be reliable and robust against malicious manipulations, the used communication services must sup...
متن کاملSecurity protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the security-related and cryptographic protocols used over open networks and distributed systems. The most commonly followed techniques for the application of formal methods for the ex-post analysis and verification of cryptographic protocols, as the analysis approach, are reviewed, followed by the ex...
متن کاملAnalysis of security protocols for authentication in distributed systems
Research works on the analysis and the development of authentication protocols frequently adopt the linear software development approach and are based on certain non-extensible assumptions (Tobler and Hutchison 2004), (Grob 2003), (Harbitter and Menasce 2002). This paper is part of an ongoing work regarding the development of a pre-emptive security mechanism for networks and distributed systems...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical Computer Science
سال: 2003
ISSN: 0304-3975
DOI: 10.1016/s0304-3975(02)00596-0