Complete Characterization of Security Protocols by Pattern Refinement
نویسنده
چکیده
Recently, the notion of complete characterizations of security protocols was introduced by Guttman and Thayer. We provide an alternative definition of this concept, and extend an existing protocol verification tool (Scyther) to compute our notion of complete characterization. We present both notions of complete characterization, discuss their relative merits, and provide preliminary empirical results using an extended version of the Scyther tool.
منابع مشابه
Morphological and Crystallographic Characterization of Nanoparticles by Granulometry Image Analysis and Rietveld Refinement Methods
The particle size distribution of the resultant cobalt ferrite samples was determined from Scanning Electron Microscopy (SEM) images using the granulometry image analysis method. Results showed the nanosized particles of the samples. The X-Ray Diffraction (XRD) patterns of samples were also analyzed by Rietveld refinement method. The results indicated that the precipitated sample at 95 <sup...
متن کاملSynthesis and Characterization of Nanocrystalline Ni3Al Intermetallic during Mechanical Alloying Process
In this research, formation of nanocrystalline Ni3Al intermetallic from Ni and Al elemental powders by mechanical alloying (MA) process and its characterization was investigated. Therefore, the evolutions in microstructure such as phase transformation, oxidation in air and introduction of Fe impurity from milling media after MA were evaluated using XRD, Rietveld refinement, TEM, SEM, EDS and IC...
متن کاملAttack-preserving Security Protocol Transformations
The rigorous incremental development of security protocols has so far received much less attention than protocol verification techniques. In this work, we study security protocol transformations. These can serve both for simplifying protocols before verification and, in the other direction, for developing protocols by stepwise refinement of simple abstract protocols into complex concrete ones. ...
متن کاملProvably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi Calculus and a translation function are formally defined, in order to formalize the refinement of a Spi Calculus specification into a Java implementation. The Java implementation generated by the translation function u...
متن کاملOn the semantics of Alice&Bob specifications of security protocols
In the context of security protocols, the so-called Alice&Bob notation is often used to describe the messages exchanged between honest principals in successful protocol runs. While intuitive, this notation is ambiguous in its description of the actions taken by principals, in particular with respect to the conditions they must check when executing their roles and the actions they must take when...
متن کامل