Proceedings of the 8th ACM Conference on Computer and Communications Security 2001
DOI: 10.1145/501983.501998
|View full text |Cite
|
Sign up to set email alerts
|

Events in security protocols

Abstract: The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the inductive method. But neither of these approaches builds up the events of a protocol in a compositional way, so that there is an informal spring from the protocol to its model. By broadening the models to certain kinds of Petri nets, a restricted form of contextual nets, a compositional eventbased semantics is given to an economical, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2002
2002
2017
2017

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(29 citation statements)
references
References 10 publications
0
29
0
Order By: Relevance
“…We use the net-semantics of SPL (see [CW01]) to formally state and prove security properties. As shown in [CW01], to each protocol run in the transition semantics of SPL corresponds a run in its net semantics.…”
Section: Security Analysis Of Ssmakepmentioning
confidence: 99%
See 2 more Smart Citations
“…We use the net-semantics of SPL (see [CW01]) to formally state and prove security properties. As shown in [CW01], to each protocol run in the transition semantics of SPL corresponds a run in its net semantics.…”
Section: Security Analysis Of Ssmakepmentioning
confidence: 99%
“…The SPL net-semantics supports formal analysis of protocols and their security properties. The operational semantics and the Petri-net semantics of SPL are closely related [CW01]. As a consequence, properties of the SPL Petri-net model of a protocol hold for its χ-Spaces implementation.…”
Section: Introductionmentioning
confidence: 97%
See 1 more Smart Citation
“…The Petri-net semantics of the language supports formal proofs about the security of protocols [1,2,5,6]. Due to its close relation to the implemented transition semantics (see [2]), proved properties are properties of protocol implementations. The simple, yet formal transition semantics of χ-Spaces describes the behavior of a system communicating via a tuple space.…”
Section: The χ-Spaces Frameworkmentioning
confidence: 99%
“…The χ-Spaces language is an implementation of SPL [1,2]; protocols programmed with χ-Spaces are concise (most fit in less than one page) and enjoy rigorous semantics -a more traditional transitions-system semantics and a Petri-net semantics, both closely related [2]. We implemented the transition semantics, and use the net semantics to verify security properties of protocols.…”
Section: Introductionmentioning
confidence: 99%