2010 Ninth International Workshop on Parallel and Distributed Methods in Verification, and Second International Workshop on Hig 2010
DOI: 10.1109/pdmc-hibi.2010.14
|View full text |Cite
|
Sign up to set email alerts
|

A BSP Algorithm for the State Space Construction of Security Protocols

Abstract: This paper presents a Bulk-Synchronous Parallel (BSP) algorithm to compute the discrete state space of structured models of security protocols. The BSP model of parallelism avoids concurrency related problems (mainly deadlocks and non-determinism) and allows us to design an efficient algorithm that is at the same time simple to express. A prototype implementation has been developed, allowing to run benchmarks showing the benefits of our algorithm.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
5

Relationship

4
1

Authors

Journals

citations
Cited by 5 publications
(14 citation statements)
references
References 26 publications
0
14
0
Order By: Relevance
“…State space of security Protocols [10] In this paper, we consider models of security protocols, involving a set of agents, given as a labelled transition system (LTS). We also consider a Dolev-Yao attacker that resides on the network [11].…”
Section: A the Bsp Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…State space of security Protocols [10] In this paper, we consider models of security protocols, involving a set of agents, given as a labelled transition system (LTS). We also consider a Dolev-Yao attacker that resides on the network [11].…”
Section: A the Bsp Modelmentioning
confidence: 99%
“…BSP Computing of the state space [10] Based on the following properties, we have designed in [10] a BSP algorithm (in a SPMD fashion) for computing the state space of security protocols as shown in Fig. 3.…”
Section: A the Bsp Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…State space of security protocols [7] We models security protocols as a labelled transition system (LTS) where agents send messages over a network which contains a Dolev-Yao attacker [8]. The intruder can overhear, intercept, and synthesise any message and is only limited by the constraints of the cryptographic methods used.…”
Section: A the Bsp Modelmentioning
confidence: 99%