D2.3 Implementation of prototypes for equivalence properties
نویسندگان
چکیده
Equivalence properties are extremely useful in the analysis of security protocols for expressing privacy type properties. While reachability properties have been extensively studies and benefit from rich tool support the situation for equivalence properties is different. In this review we give an overview of four prototype tools that have been developed in the AVOTÉ project.
منابع مشابه
Fish4Knowledge Deliverable D2.3 Component-based prototypes and evaluation criteria
We provide an overview of the various user interface components developed and evaluated in the Fish4Knowledge project, and describe the development plans for future components and their evaluation criteria. Deliverable due: Month 18 Version 1.1; 2012-11-8 Page 1 of 49 c © Fish4Knowledge Consortium, 2012 IST – 257024 – Fish4Knowledge Deliverable D2.3
متن کاملInvestigation of the effective factors on manufacturing calcium phosphates prototypes using 3D printing
Calcium phosphate ceramics has been widely used in the present due to their chemical similarity to bone and good biocompatibility in the physiological environmental and a compatibility with synthetic and natural polymers Recent advancements in additive manufacturing have enabled the fabrication of 3D prototypes with controlled architecture resembling the natural bone. Binder jetting is a versat...
متن کاملPartial Observation in Distributed Supervisory Control of Discrete-Event Systems
Distributed supervisory control is a method to synthesize local controllers in discrete-eventsystems with a systematic observation of the plant. Some works were reported on extending this methodby which local controllers are constructed so that observation properties are preserved from monolithic todistributed supervisory control, in an up-down approach. In this paper, we find circumstances in ...
متن کاملA Reduced Semantics for Deciding Trace Equivalence
Many privacy-type properties of security protocols can be modelled using trace equivalence properties in suitable process algebras. It has been shown that such properties can be decided for interesting classes of finite processes (i.e., without replication) by means of symbolic execution and constraint solving. However, this does not suffice to obtain practical tools. Current prototypes suffer ...
متن کاملA Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems
Many privacy-type properties of security protocols can be modelled using trace equivalence properties in suitable process algebras. It has been shown that such properties can be decided for interesting classes of finite processes (i.e., without replication) by means of symbolic execution and constraint solving. However, this does not suffice to obtain practical tools. Current prototypes suffer ...
متن کامل