A comparison of three authentication properties
نویسندگان
چکیده
Authentication is a slippery security property that has been formally de/ned only recently; among the recent de/nitions, two rather interesting ones have been proposed for the spi-calculus by (Abadi and Gordon (in: Proc. CONCUR’97, Lecture Notes in Computer Science, Vol. 1243, Springer, Berlin, 1997, pp. 59–73; Inform. and Comput. 148(1) (1999) 1–70) and for CSP by Lowe (in: Proc. 10th Computer Security Foundation Workshop, IEEE Press, 1997, pp. 31–43). On the other hand, in a recent paper (in: Proc. World Congr. on Formal Methods (FM’99), Lecture Notes in Computer Science, Vol. 1708, Springer, Berlin, 1999, pp. 794–813), we have proved that many existing security properties can be seen uniformly as speci/c instances of a general scheme based on the idea of non-interference. The purpose of this paper is to show that, under reasonable assumptions, spi-authentication can be recast in this general framework as well, by showing that it is equivalent to the non-interference property called NDC of Focardi and Gorrieri (J. Comput. Security 3(1) (1994=1995) 5–33; IEEE Trans. Software Eng. 23(9) (199) 550–571). This allows for the comparison between such a property and the one based on CSP, which was already recast under the general scheme of Focardi and Martinelli (1999). c © 2002 Elsevier Science B.V. All rights reserved.
منابع مشابه
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملCorrigendum to “Comparison of Two Multiplex PCR Systems for Meat Species Authentication” [Journal of Food Quality and Hazards Control 6 (2019) 8-15]
This article has no abstract. DOI: 10.18502/jfqhc.6.2.959
متن کاملComparison of Two Multiplex PCR Systems for Meat Species Authentication
Background: Meat species adulteration has become a problem of concern. This study aimed to compare two previously published multiplex Polymerase Chain Reaction (PCR) methods for meat species authentication. Methods: The primers used in the first multiplex PCR involved species-specific reverse primer for sheep, goat, cattle, pig, and donkey with universal forward primer. In the second multiple...
متن کاملسیستم جدید احراز هویت مبتنی بر تبدیل های کانتورلت و موجک برای تصاویر با کیفیت پائین کف دست
This paper proposed an authentication system based on low quality palmprint. For implementation of this system, first the features is extracted by using Contourlet and wavelet transforms. In the second phase, some of the features are selected by using Across Group Variance (AGV) filter. In the last phase by using a classification method, the authentication is completed. For classification we ev...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Theor. Comput. Sci.
دوره 291 شماره
صفحات -
تاریخ انتشار 2003