Using Process Algebras to Formally Specify Mobile Agent Data Integrity Properties: A Case Study
نویسندگان
چکیده
This paper shows how cryptographic protocols for mobile agent data integrity properties can be formally specified by using spi calculus, an extension of calculus with cryptographic properties. In particular, by means of a case study, it is shown how a specification technique initially conceived only for classical cryptographic protocols can be used in the context of mobile agents as well. Our case study includes the spi calculus specification of a sample mobile agent data integrity protocol and of its security property.
منابع مشابه
Mobility Types in Coq
The need for formal methods for certifying the good behaviour of computer software is dramatically increasing with the growing complexity of the latter. Moreover, in the global computing framework one must face the additional issues of concurrency and mobility. In the recent years many new process algebras have been introduced in order to reason formally about these problems; the common pattern...
متن کاملSpecifying Agent's Goals in 3D Scenarios Using Process Algebras
This paper presents a method to specify agent’s goals using process algebras. Formal specification of agent’s goal is important in goal oriented works because it allows more detailed description about what we want an agent to do and also is possible to detect possible problems. In this paper we present the method we use to specify formally agent’s goals in GeDA-3D a platform useful to implement...
متن کاملFormal Speci cation and Veri cation of Mobile Agent Data Integrity Properties: a Case Study
The aim of the work presented in this paper is to check cryptographic protocols for mobile agents against both network intruders and malicious hosts using formal methods. We focus attention on data integrity properties and show how the techniques used for classical message-based protocols such as authentication protocols can be applied to mobile agent systems as well. To illustrate our approach...
متن کاملExperiments on Formal Verification of Mobile Agent Data Integrity Properties
This paper explores the possibility of applying existing verification techniques and tools to the cryptographic mechanisms specifically designed for the protection of mobile agents from their environment, with a particular emphasis on agent data integrity. In a previous paper we explored the use of the CSPbased tools FDR and Casper. Here, instead, we present our experience with a prototype of a...
متن کاملA Formal Petri Net Based Model for Antivirus Update Agent System
In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...
متن کامل