Complete Characterization of Security Protocols by Pattern Refinement

نویسنده

  • Cas J. F. Cremers
چکیده

Recently, the notion of complete characterizations of security protocols was introduced by Guttman and Thayer. We provide an alternative definition of this concept, and extend an existing protocol verification tool (Scyther) to compute our notion of complete characterization. We present both notions of complete characterization, discuss their relative merits, and provide preliminary empirical results using an extended version of the Scyther tool.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Morphological and Crystallographic Characterization of Nanoparticles by Granulometry Image Analysis and Rietveld Refinement Methods

The particle size distribution of the resultant cobalt ferrite samples was determined from Scanning Electron Microscopy (SEM) images using the granulometry image analysis method. Results showed the nanosized particles of the samples. The X-Ray Diffraction (XRD) patterns of samples were also analyzed by Rietveld refinement method. The results indicated that the precipitated sample at 95 <sup...

متن کامل

Synthesis and Characterization of Nanocrystalline Ni3Al Intermetallic during Mechanical Alloying Process

In this research, formation of nanocrystalline Ni3Al intermetallic from Ni and Al elemental powders by mechanical alloying (MA) process and its characterization was investigated. Therefore, the evolutions in microstructure such as phase transformation, oxidation in air and introduction of Fe impurity from milling media after MA were evaluated using XRD, Rietveld refinement, TEM, SEM, EDS and IC...

متن کامل

Attack-preserving Security Protocol Transformations

The rigorous incremental development of security protocols has so far received much less attention than protocol verification techniques. In this work, we study security protocol transformations. These can serve both for simplifying protocols before verification and, in the other direction, for developing protocols by stepwise refinement of simple abstract protocols into complex concrete ones. ...

متن کامل

Provably correct Java implementations of Spi Calculus security protocols specifications

Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi Calculus and a translation function are formally defined, in order to formalize the refinement of a Spi Calculus specification into a Java implementation. The Java implementation generated by the translation function u...

متن کامل

On the semantics of Alice&Bob specifications of security protocols

In the context of security protocols, the so-called Alice&Bob notation is often used to describe the messages exchanged between honest principals in successful protocol runs. While intuitive, this notation is ambiguous in its description of the actions taken by principals, in particular with respect to the conditions they must check when executing their roles and the actions they must take when...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007