Soft constraint programming to analysing security protocols
نویسندگان
چکیده
منابع مشابه
Soft Constraint Programming to Analysing Security Protocols
Security protocols stipulate how the remote principals of a computer network should interact in order to obtain specific security goals. The crucial goals of confidentiality and authentication may be achieved in various forms, each of different strength. Using soft (rather than crisp) constraints, we develop a uniform formal notion for the two goals. They are no longer formalised as mere yes/no...
متن کاملAnalysing layered security protocols
Many security protocols are built as the composition of an applicationlayer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the application-layer protocol is proven under the assumption that the transport layer satisfies certain properti...
متن کاملAnalysing Security Protocols with AVISPA
Usage of the Internet has increased rapidly over the past decade. Increased amount of network users has also brought along a need of network-based services that require security. Developing new security protocols is a difficult task and sometimes too difficult task for human mind. We need an efficient tools to help the development and verification of the protocols. In this paper we introduce th...
متن کاملAnalysing Security Protocols using CSP
In this chapter we describe how security protocols can be analysed using the process algebra CSP and the model checker FDR. The basic technique is to build a CSP model of a small system running the protocol, together with the most general intruder who can interact with that protocol, and then to use the model checker FDR to explore the state space, looking for insecure behaviours. We will base ...
متن کاملχ-Spaces: Programming Security Protocols
We introduce χ-Spaces, a domain specific programming language tailored to the development of security protocols. χ-Spaces has a rigorous formal semantics which allows us to reason about the actual implementation of security protocols. In this manner we fill-in the gap between the formal specification of a protocol and its actual implementation.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theory and Practice of Logic Programming
سال: 2004
ISSN: 1471-0684,1475-3081
DOI: 10.1017/s1471068404002121