Proceedings of the 8th ACM Conference on Computer and Communications Security - CCS '01 2001
DOI: 10.1145/501997.501998
|View full text |Cite
|
Sign up to set email alerts
|

Events in security protocols

Abstract: The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the inductive method. But neither of these approaches builds up the events of a protocol in a compositional way, so that there is an informal spring from the protocol to its model. By broadening the models to certain kinds of Petri nets, a restricted form of contextual nets, a compositional eventbased semantics is given to an economical, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2003
2003
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(35 citation statements)
references
References 1 publication
0
35
0
Order By: Relevance
“…Name generation: There are methods to represent the generation of new names in causal models, e.g. [23,92,108]. But the methods are overly concrete in the sense that they ignore the implicit symmetry on names.…”
Section: Anomalies In Traditional Causal Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…Name generation: There are methods to represent the generation of new names in causal models, e.g. [23,92,108]. But the methods are overly concrete in the sense that they ignore the implicit symmetry on names.…”
Section: Anomalies In Traditional Causal Modelsmentioning
confidence: 99%
“…[59], and become increasingly so as chip design is forced to count the cost of communication [70]. Significant advances have been made in the more limited regime of security protocols [23,43,92]there are gaps in the treatment and exploitation of symmetry, and in relations with cryptography, which calls for probability. Two other specialized areas which rely on causal models, and probabilistic event structures [97], are the distributed diagnosis of communication networks [10], and the very recent Bayesian analysis of event-based trust [71].…”
Section: Research Areasmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, strand spaces have also been studied by Crazzolara and Winskel in comparison to other models of concurrency [CW01,CW02], notably including event structures Petri nets and the algebraic process language SPL; the latter is a simplified (since channel-free) spi-calculus that is enhanced with some form of pattern-matching (cf. also [HJ06] for pattern-matching in a more standard spi-calculus, and our comments below).…”
Section: Tight Semanticsmentioning
confidence: 99%
“…This, however, is not the case. In [CW01], for any given SPL-process P in some particularly restricted form called !-par process, Crazzolara and Winskel show how to formally and closely relate the net behavior Net(P ) to the strand space behavior Tr(P ). In contrast, they do not offer any way to translate strand spaces back into SPL-terms, which would be required to inherit the desired operational semantics.…”
Section: Tight Semanticsmentioning
confidence: 99%