منابع مشابه
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols, possibly sharing some common identities and keys like public keys or l...
متن کاملVéronique Cortier and Stéphanie Delaune Safely composing security protocols Research Report LSV - 08 - 06 March 2008
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol in the presence of an active attacker that may block, intercept and send new messages. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where o...
متن کاملComposing Security Protocols: From Confidentiality to Privacy
Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equa...
متن کاملComposing Safely - A Type System for Aspects
In this paper we present an approach towards safe software composition based on aspect-orientation. Aspects enable the systematic addition of code into existing programs but often they also introduce errors. In order to provide safe aspects for software composition we address the verification of the aspect-oriented language paradigm. We construct a basic calculus for aspects with types and prov...
متن کاملComposing Interfering Abstract Protocols
The undisciplined use of shared mutable state can be a source of program errors when aliasesunsafely interfere with each other. While protocol-based techniques to reason about interferenceabound, they do not address two practical concerns: the decidability of protocol composition andits integration with protocol abstraction. We show that our composition procedure is decidable and<lb...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Formal Methods in System Design
سال: 2008
ISSN: 0925-9856,1572-8102
DOI: 10.1007/s10703-008-0059-4