An Open Approach for the Applied Pi Calculus

نویسندگان

  • Han Zhu
  • Yonggen Gu
  • Xiaohong Wu
چکیده

A notion of open bisimulation is proposed for the Applied Pi Calculus, which extends π-calculus in order to facilitate analyzing security protocols. Our notion is based on the labeled transition system, and takes a knowledge aware open approach to model knowledge in security protocols. It is shown to be sound to labeled bisimilarity and is a congruent relation. As a running example, we analyze two e-commerce protocol, namely iKP and Ferguson’s electronic cash protocol, by Applied Pi and open bisimilarity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

Discovering concrete attacks on website authorization by formal analysis 1

Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social networks, such as Facebook, Twitter and Google, on the basis of new open standards such as the OAuth 2.0 authorization protocol. A formal analysis of these protocols must account for malicious websites and common web app...

متن کامل

Applied pi calculus

The applied pi calculus is a language for modelling security protocols. It is an extension of the pi calculus, a language for studying concurrency and process interaction. This chapter presents the applied pi calculus in a tutorial style. It describes reachability, correspondence, and observational equivalence properties, with examples showing how to model secrecy, authentication, and privacy a...

متن کامل

DIRECT ADAPTIVE FUZZY PI SLIDING MODE CONTROL OF SYSTEMS WITH UNKNOWN BUT BOUNDED DISTURBANCES

An asymptotically stable direct adaptive fuzzy PI sliding modecontroller is proposed for a class of nonlinear uncertain systems. In contrast toother existing approaches of handling disturbances, the proposed approachdoes not require this bound to be known, only requiring that it exists.Moreover, a PI control structure is used to attenuate chattering. The approachis applied to stabilize an open-...

متن کامل

On the expressiveness of interaction

Subbisimilarity is proposed as a general tool to classify the relative expressive power of process calculi. The expressiveness of several variants of CCS is compared in terms of the subbisimilarity relationship. Similar investigation is also carried out for the variants of the pi calculus. The relative expressiveness of the different forms of the choice operation and the different ways of intro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JSW

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2008