منابع مشابه
Types for Security Protocols*
We revise existing type-based analyses of security protocols bydevising a core type system for secrecy, integrity and authentication inthe setting of spi-calculus processes. These fundamental security proper-ties are usually studied independently. Our exercise of considering all ofthem in a uniform framework is interesting under different perspectives:(i) it provides a gener...
متن کاملRequirements for Security Protocols
A correct security protocol should satisfy four requirements: no-intrusion, authenticity, freshness, and secrecy. We divide the four requirements into two groups (one for no-intrusion, authenticity, and freshness and the other for secrecy). For the former we use the message-exchange forms and for the latter, we use the p-knows and n-knows information that is inferred from a latest topological o...
متن کاملSecurity Protocols
In this paper, we show how a novel tool for analyzing classical cryptographic protocols can be used to model and analyze the more complex Internet security protocol families. We discuss the modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security (TLS) protocol. We also show how a flaw carried over to TLS from the Secure Sockets Layer prot...
متن کاملModel Checking for Security Protocols
As more resources are added to computer networks, and as more vendors look to the World Wide Web as a viable marketplace, the importance of being able to restrict access and to insure some kind of acceptable behavior even in the presence of malicious intruders becomes paramount. People have looked to cryptography to help solve many of these problems. However, cryptography itself is only a tool....
متن کاملSecurity Protocols
1 Theory of Agents and Messages for Security Protocols 13 1.0.1 Inductive Definition of All Parts” of a Message . . . . . . 14 1.0.2 Inverse of keys . . . . . . . . . . . . . . . . . . . . . . . . 14 1.1 keysFor operator . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.2 Inductive relation ”parts” . . . . . . . . . . . . . . . . . . . . . . 15 1.2.1 Unions . . . . . . . . . . . . . . ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Proceedings in Theoretical Computer Science
سال: 2009
ISSN: 2075-2180
DOI: 10.4204/eptcs.7.0.1