Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis

In previous work, we introduced a version of distributed temporal logic that is well-suited both for verifying security protocols and as a metalogic for reasoning about, and relating, different security protocol models. In this paper, we formally investigate the relationship between our approach and strand spaces, which is one of the most successful and widespread formalisms for analyzing secur...

متن کامل

Distributed temporal logic for the analysis of security protocol models

The distributed temporal logic DTL is an expressive logic, well-suited for formalizing properties of concurrent, communicating agents. We show how DTL can be used as a metalogic to reason about and relate different security-protocol models. This includes reasoning about model simplifications, where models are transformed to have fewer agents or behaviors, and verifying model reductions, where t...

متن کامل

Distributed Contingency Logic and Security

In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...

متن کامل

A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis

Formal analysis of security protocols is largely based on a set of assumptions commonly referred to asthe Dolev-Yao model. Two formalisms that state the basic assumptions of this model are related here:strand spaces and multiset rewriting with existential quantification. Strand spaces provide a simple andeconomical approach to analysis of completed protocol runs by emphasizing causa...

متن کامل

Relating multiset rewriting and process algebras for security protocol analysis

When formalizing security protocols, different specificationlanguages support very different reasoning methodologies, whose resultsare not directly or easily comparable. Therefore, establishing clear map-pings among different frameworks is highly desirable, as it permits vari-ous methodologies to cooperate by interpreting theoretical and practicalresults of one system into a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Logic Journal of the IGPL

سال: 2005

ISSN: 1368-9894,1367-0751

DOI: 10.1093/jigpal/jzi048