Safely composing security protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Safely Composing Security Protocols

Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols, possibly sharing some common identities and keys like public keys or l...

متن کامل

Véronique Cortier and Stéphanie Delaune Safely composing security protocols Research Report LSV - 08 - 06 March 2008

Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol in the presence of an active attacker that may block, intercept and send new messages. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where o...

متن کامل

Composing Security Protocols: From Confidentiality to Privacy

Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equa...

متن کامل

Composing Safely - A Type System for Aspects

In this paper we present an approach towards safe software composition based on aspect-orientation. Aspects enable the systematic addition of code into existing programs but often they also introduce errors. In order to provide safe aspects for software composition we address the verification of the aspect-oriented language paradigm. We construct a basic calculus for aspects with types and prov...

متن کامل

Composing Interfering Abstract Protocols

The undisciplined use of shared mutable state can be a source of program errors when aliasesunsafely interfere with each other. While protocol-based techniques to reason about interferenceabound, they do not address two practical concerns: the decidability of protocol composition andits integration with protocol abstraction. We show that our composition procedure is decidable and<lb...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Formal Methods in System Design

سال: 2008

ISSN: 0925-9856,1572-8102

DOI: 10.1007/s10703-008-0059-4