Deducing Security Goals From Shape Analysis Sentences
نویسنده
چکیده
Guttman presented a model-theoretic approach to establishing security goals in the context of Strand Space theory. In his approach, a run of the Cryptographic Protocol Shapes Analyzer (cpsa) produces models that determine if a goal is satisfied. This paper presents a method for extracting a sentence that completely characterizes a run of cpsa. Logical deduction can then be used to determine if a goal is satisfied. This method has been implemented and is available to all.
منابع مشابه
Proving Security Goals With Shape Analysis Sentences
The paper that introduced shape analysis sentences presented a method for extracting a sentence in first-order logic that completely characterizes a run of cpsa. Logical deduction can then be used to determine if a security goal is satisfied. This paper presents a method for importing shape analysis sentences into a proof assistant on top of a detailed theory of strand spaces. The result is a s...
متن کاملShape Design Optimization of Unimorph Piezoelectric Cantilever Energy Harvester
The most promising method for micro scale energy scavenging is via vibration energy harvesting which converts mechanical energy to electrical energy. Using piezoelectric cantilevers is the most common method for vibration energy harvesting. Changing the shape of the cantilevers can lead to changing the generated output voltage and power. In this work vibration energy harvesting via piezoelectri...
متن کاملPerformance Assessment and analysis of Specialized Nutrition and Food Security Working Group in Achiveing Strategic Goals of National Nutrition and Food Security Document in Iran
Performance Assessment and analysis of Specialized Nutrition and Food Security Working Group in Achiveing Strategic Goals of National Nutrition and Food Security Document in Iran Mona Pourghaderi1, Fatemeh Mohammadi-Nasrabadi2, Behzad Damari3*, Zahra Abdollahi4, Shiva Mafimoradi5,6, Sareh Edalati7, Nasrin Omidvar8** 1Ph.D. Candidate in Food and Nutrition Policy, Department of Community Nutriti...
متن کاملModeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/CPN
In this paper, we present a technique to model and analyse cryptographic protocols using coloured Petri nets. A model of the protocol is constructed in a top-down manner: first the protocol is modeled without an intruder, then a generic intruder model is added. The technique is illustrated on the TMN protocol, with several mechanisms introduced to reduce the size of the occurrence graph. A smal...
متن کاملGlobal Health Governance Challenges 2016 – Are We Ready?
The year 2016 could turn out to be a turning point for global health, new political realities and global insecurities will test governance and financing mechanisms in relation to both people and planet. But most importantly political factors such as the global power shift and “the rise of the rest” will define the future of global health. A new mix of health inequity and security challenges has...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1204.0480 شماره
صفحات -
تاریخ انتشار 2012