Information based reasoning about security protocols
نویسندگان
چکیده
منابع مشابه
A Spatial-Epistemic Logic for Reasoning about Security Protocols
Reasoning about security properties involves reasoning about where the information of a system is located, and how it evolves over time. While most security analysis techniques need to cope with some notions of information locality and knowledge propagation, usually they do not provide a general language for expressing arbitrary properties involving local knowledge and knowledge transfer. Build...
متن کاملToward Reasoning about Security Protocols: A Semantic Approach
We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents participating in the protocol, using Kripke models and transitions between them based on updates of the agents’ beliefs associated with steps in the protocol. As a case study we wil...
متن کاملA Timed Logic for Modeling and Reasoning about Security Protocols
Many logical methods are usually considered suitable to express the static properties of security protocols while unsuitable to model dynamic processes or properties. However, a security protocol itself is in fact a dynamic process over time, and sometimes it is important to be able to express time-dependent security properties of protocols. In this paper, we present a new timed logic based on ...
متن کاملReasoning About Active Network Protocols
Active Networks allow users to \program" the network infrastructure, by injecting information that describes or controls a distributed algorithm to be executed for the user by the network infrastructure. The nature of the services that can be implemented with such a facility is determined by the programming interface to the active network, i.e. the set of abstractions it exposes to users. The c...
متن کاملPlanning Based on Reasoning About Information Changes
We consider the problem of reasoning about information changes in the context of complex concepts approximated hierarchically and actions that can be triggered to change properties of investigated objects. A given object can be in an unwanted state, where some concept is not satisfied to the required degree. We would like to find a plan (sequence of actions to be executed) of object’s transform...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Notes in Theoretical Computer Science
سال: 2003
ISSN: 1571-0661
DOI: 10.1016/s1571-0661(04)00246-4