Deducing Security Goals From Shape Analysis Sentences

نویسنده

  • John D. Ramsdell
چکیده

Guttman presented a model-theoretic approach to establishing security goals in the context of Strand Space theory. In his approach, a run of the Cryptographic Protocol Shapes Analyzer (cpsa) produces models that determine if a goal is satisfied. This paper presents a method for extracting a sentence that completely characterizes a run of cpsa. Logical deduction can then be used to determine if a goal is satisfied. This method has been implemented and is available to all.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proving Security Goals With Shape Analysis Sentences

The paper that introduced shape analysis sentences presented a method for extracting a sentence in first-order logic that completely characterizes a run of cpsa. Logical deduction can then be used to determine if a security goal is satisfied. This paper presents a method for importing shape analysis sentences into a proof assistant on top of a detailed theory of strand spaces. The result is a s...

متن کامل

Shape Design Optimization of Unimorph Piezoelectric Cantilever Energy Harvester

The most promising method for micro scale energy scavenging is via vibration energy harvesting which converts mechanical energy to electrical energy. Using piezoelectric cantilevers is the most common method for vibration energy harvesting. Changing the shape of the cantilevers can lead to changing the generated output voltage and power. In this work vibration energy harvesting via piezoelectri...

متن کامل

Performance Assessment and analysis of Specialized Nutrition and Food Security Working Group in Achiveing Strategic Goals of National Nutrition and Food Security Document in Iran

Performance Assessment and analysis of Specialized Nutrition and Food Security Working Group in Achiveing Strategic Goals of National Nutrition and Food Security Document in Iran Mona Pourghaderi1, Fatemeh Mohammadi-Nasrabadi2, Behzad Damari3*, Zahra Abdollahi4, Shiva Mafimoradi5,6, Sareh Edalati7, Nasrin Omidvar8** 1Ph.D. Candidate in Food and Nutrition Policy, Department of Community Nutriti...

متن کامل

Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/CPN

In this paper, we present a technique to model and analyse cryptographic protocols using coloured Petri nets. A model of the protocol is constructed in a top-down manner: first the protocol is modeled without an intruder, then a generic intruder model is added. The technique is illustrated on the TMN protocol, with several mechanisms introduced to reduce the size of the occurrence graph. A smal...

متن کامل

Global Health Governance Challenges 2016 – Are We Ready?

The year 2016 could turn out to be a turning point for global health, new political realities and global insecurities will test governance and financing mechanisms in relation to both people and planet. But most importantly political factors such as the global power shift and “the rise of the rest” will define the future of global health. A new mix of health inequity and security challenges has...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1204.0480  شماره 

صفحات  -

تاریخ انتشار 2012