Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
نویسندگان
چکیده
منابع مشابه
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
In previous work, we introduced a version of distributed temporal logic that is well-suited both for verifying security protocols and as a metalogic for reasoning about, and relating, different security protocol models. In this paper, we formally investigate the relationship between our approach and strand spaces, which is one of the most successful and widespread formalisms for analyzing secur...
متن کاملDistributed temporal logic for the analysis of security protocol models
The distributed temporal logic DTL is an expressive logic, well-suited for formalizing properties of concurrent, communicating agents. We show how DTL can be used as a metalogic to reason about and relate different security-protocol models. This includes reasoning about model simplifications, where models are transformed to have fewer agents or behaviors, and verifying model reductions, where t...
متن کاملDistributed Contingency Logic and Security
In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...
متن کاملA Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis
Formal analysis of security protocols is largely based on a set of assumptions commonly referred to asthe Dolev-Yao model. Two formalisms that state the basic assumptions of this model are related here:strand spaces and multiset rewriting with existential quantification. Strand spaces provide a simple andeconomical approach to analysis of completed protocol runs by emphasizing causa...
متن کاملRelating multiset rewriting and process algebras for security protocol analysis
When formalizing security protocols, different specificationlanguages support very different reasoning methodologies, whose resultsare not directly or easily comparable. Therefore, establishing clear map-pings among different frameworks is highly desirable, as it permits vari-ous methodologies to cooperate by interpreting theoretical and practicalresults of one system into a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Logic Journal of the IGPL
سال: 2005
ISSN: 1368-9894,1367-0751
DOI: 10.1093/jigpal/jzi048