Foundations of Computer Security Affiliated with LICS ’ 02 FLoC ’ 02 Copenhagen , Denmark

نویسندگان

  • Sylvain Conchon
  • Luca Compagna
چکیده

Formal analysis of cryptographic protocols has mainly concentrated on protocols with closed-ended data structures, where closed-ended data structure means that the messages exchanged between principals have fixed and finite format. However, in many protocols the data structures used are open-ended, i.e., messages have an unbounded number of data fields. Formal analysis of protocols with open-ended data structures is one of the challenges pointed out by Meadows. This work studies decidability issues for such protocols. We propose a protocol model in which principals are described by transducers, i.e., finite automata with output, and show that in this model security is decidable and PSPACE-hard in presence of the standard Dolev-Yao intruder.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Foundations of Computer Security Affiliated with LICS ’ 05 Chicago , IL June 30 - July 1 , 2005

Applications that manipulate sensitive information should ensure end-to-end security by satisfying two properties: sound execution and some form of noninterference. By the former, we mean the program should always perform actions in keeping with its current policy, and by the latter we mean that these actions should never cause high-security information to be visible to a low-security observer....

متن کامل

Foundations of Computer Security Affiliated with LICS ’ 03 Ottawa , Canada June 26 – 27 , 2003

At the Dolev-Yao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logi...

متن کامل

Logic in Access Control

Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and tools. This paper is a partial survey and discussion of the role of logic in access control. It considers logical foundations for access control and their applications, in particular in languages for programming securi...

متن کامل

Leukemia-initiating cells from some acute myeloid leukemia patients with mutated nucleophosmin reside in the CD34(-) fraction.

Leukemia-initiating cells (LICs) in acute myeloid leukemia (AML) are believed to be restricted to the CD34(+) fraction. However, one of the most frequently mutated genes in AML is nucleophosmin (NPM), and this is associated with low CD34 expression. We, therefore, investigated whether NPM-mutated AMLs have LICs restricted to the CD34(+) fraction. We transplanted sorted fractions of primary NPM-...

متن کامل

A Critical Analyis of the Øresund Bridge, Connecting Copenhagen to Malmö

This paper aims to provide a critical analysis of The Øresund Bridge, connecting Copenhagen (Denmark) to Malmö (Sweden). The analysis will include a discussion on the aesthetic, structural design, foundations, construction sequence, sustainability aspects of the bridge and the structural checks calculated under different load combinations. Attention will be paid to the short fabrication and con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002