Modelling security properties with CSP
نویسنده
چکیده
Security properties such as conndentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justiied, the use of a process algebra such as Communicating Sequential Processes (CSP) seems appropriate to describe and analyse them. This paper explores ways in which security properties may be described as CSP speciications, how security mechanisms may be captured, and how particular protocols designed to provide these properties may be analysed within the CSP framework. The paper is concerned with the theoretical basis for such analysis. A formal veriication of a simple example is carried out as an illustration.
منابع مشابه
Modelling of Conventional and Severe Shot Peening Influence on Properties of High Carbon Steel via Artificial Neural Network
Shot peening (SP), as one of the severe plastic deformation (SPD) methods is employed for surface modification of the engineering components by improving the metallurgical and mechanical properties. Furthermore artificial neural network (ANN) has been widely used in different science and engineering problems for predicting and optimizing in the last decade. In the present study, effects of conv...
متن کاملCSP and determinism in security modelling
We show how a variety of confidentiality properties can be expressed in terms of the abstraction mechanisms that CSP provides. We argue that determinism of the abstracted low-security viewpoint provides the best type of property. By changing the form of abstraction mechanism we are able to model different assumptions about how systems behave, including handling the distinction between input and...
متن کاملSecurity properties and CSP - Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on
Security properties such as confidentiality and authenticity may be considered in terms of the flow of messages within a network. To the extent that this characterisation is justified, the use of a process algebra such as Communicating Sequential Processes (CSP) seems appropriate to describe and analyse them’. This paper explores ways in which security properties may be described as CSP specifi...
متن کاملModelling unbounded parallel sessions of security protocols in CSP
We show that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid. This both allows us to extend the scope of our proofs and produce checks that are enormously more efficient.
متن کاملValidating the Security of Medusa: A survivability Protocol for Security Systems
In this paper a new approach for enabling survivable secure communications in multi agent systems is validated through CSP/FDR state analysis. The security validation of this approach centers around three security properties: confidentiality, integrity and authentication. Requirements for these security properties are defined for every message generated by this security protocol during its life...
متن کامل