Typed MSR: Syntax and Examples

نویسنده

  • Iliano Cervesato
چکیده

Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security — MMM’01 (V. Gorodetski, V. Skormin and L. Popyack, editors), pp.??–??, c Springer-Verlag LNCS ???, St. Petersburg, Russia, 21–23 May 2001 cols can be traced to inadequate specification languages for message components, environment assumptions, and goals. In this paper, we present MSR, a strongly typed specification language for security protocols, which is intended to address the first two issues. Its typing infrastructure, based on the theory of dependent types with subsorting, yields elegant and precise formalizations, and supports a useful array of static check that include type-checking and access control validation. It uses multiset rewriting rules to express the actions of the protocol. The availability of memory predicates enable it to faithfully encode systems consisting of a collection of coordinated subprotocols, and constraints allow tackling objects belonging to complex interpretation domains, e.g. time stamps, in an abstract and modular way. We apply MSR to the specification of several examples.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Phantom Types

Phantom types are data types with type constraints associated with different cases. Examples of phantom types include typed type representations and typed higher-order abstract syntax trees. These types can be used to support typed generic functions, dynamic typing, and staged compilation in higher-order, statically typed languages such as Haskell or Standard ML. In our system, type constraints...

متن کامل

A Broad-Typed Multi-Sensing-Range Method for Indoor Position Estimation of Passive RFID Tags

The RFID (Radio Frequency IDentification) system is paid attention as a technology that can realize a ubiquitous environment. Each RFID tag has a unique ID code, and is attached on some object with the information of the objects. A user reads the unique ID code using RFID readers and obtains the information of the object. One of the important applications of RFID technology is the indoor positi...

متن کامل

Typed Multiset Rewriting Specifications of Security Protocols

The language MSR has successfully been used in the past to prove undecidability results about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise this formalism into a flexible specification framework for complex crypto-protocols. More specifically, we equip it with an extensible typing infrastructure based on dependent types with subsorting, which elegan...

متن کامل

First-Class Phantom Types

Classical phantom types are datatypes in which type constraints are expressed using type variables that do not appear in the datatype cases themselves. They can be used to embed typed languages into Haskell or ML. However, while such encodings guarantee that only wellformed data can be constructed, they do not permit type-safe deconstruction without additional tagging and run-time checks. We in...

متن کامل

Remarks on Agreement and Incorporation Phenomena

In previous work (see Anderson 1992 and references cited there), I have developed a particular approach to the issue of “Lexicalism” in syntax. I have argued for a view of the relation between morphology and syntax on which a specific kind of feature complex (the Morphosyntactic Representation, or “MSR” of a form) constitutes the only interface between morphological and syntactic structure. The...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001