Results 1 
8 of
8
Relating Process Algebras and Multiset Rewriting for Security Protocol Analysis
 Third Workshop on Issues in the Theory of Security — WITS’03
, 2002
"... When formalizing security protocols, di#erent specification languages support very di#erent reasoning methodologies, whose results are not directly or easily comparable. Therefore, establishing clear relationships among di#erent frameworks is highly desirable, as it permits various methodologies ..."
Abstract

Cited by 8 (4 self)
 Add to MetaCart
(Show Context)
When formalizing security protocols, di#erent specification languages support very di#erent reasoning methodologies, whose results are not directly or easily comparable. Therefore, establishing clear relationships among di#erent frameworks is highly desirable, as it permits various methodologies to cooperate by interpreting theoretical and practical results of one system in another. In this paper, we examine the nontrivial relationship between two general verification frameworks: multiset rewriting (MSR) and a process algebra (PA) inspired to the CCS and the #calculus. We present two separate mappings, one from MSR to PA and the other from PA to MSR. Although defining a simple and general bijection between MSR and PA appears di#cult, we show that in the specific context of cryptographic protocols they do admit e#ective translations that preserve traces Keywords: Security Protocols, Multiset Rewriting, Process Algebras.
Encryption as an abstract datatype: An extended abstract
, 2003
"... At the DolevYao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenv ..."
Abstract

Cited by 7 (2 self)
 Add to MetaCart
At the DolevYao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logic. In particular, encrypted data can be seen naturally as an abstract datatype. Entailments between security protocols as linear logic theories can be surprisingly strong. We also illustrate how the wellknown connection in linear logic between bipolar formulas and general formulas can be used to show that the asynchronous model of communication given by multiset rewriting rules can be understood, more naturally as asynchronous process calculus (also represented directly as linear logic formulas). The familiar proof theoretic notion of interpolants can also serve to characterize communication between a role and its environment.
Substructural Logical Specifications
, 2012
"... Any opinions, findings, conclusions or recommendations expressed in this publication are those of the author and A logical framework and its implementation should serve as a flexible tool for specifying, simulating, and reasoning about formal systems. When the formal systems we are interested in exh ..."
Abstract

Cited by 6 (2 self)
 Add to MetaCart
(Show Context)
Any opinions, findings, conclusions or recommendations expressed in this publication are those of the author and A logical framework and its implementation should serve as a flexible tool for specifying, simulating, and reasoning about formal systems. When the formal systems we are interested in exhibit state and concurrency, however, existing logical frameworks fall short of this goal. Logical frameworks based on a rewriting interpretation of substructural logics, ordered and linear logic in particular, can help. To this end, this dissertation introduces and demonstrates four methodologies for developing and using substructural logical frameworks for specifying and reasoning about stateful and concurrent systems. Structural focalization is a synthesis of ideas from Andreoli’s focused sequent calculi and Watkins’s hereditary substitution. We can use structural focalization to take a logic and define a restricted form of derivations, the focused derivations, that form the basis of a logical framework. We apply this methodology to define SLS, a logical framework for substructural logical specifications, as a fragment of ordered
Collection analysis for Horn clause programs
 In Proceedings of PPDP 2006: 8th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming
, 2006
"... dale.miller [at] inria.fr ..."
(Show Context)
Abstract FCS’03 Preliminary Version Encryption as an abstract datatype:
"... At the DolevYao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenv ..."
Abstract
 Add to MetaCart
(Show Context)
At the DolevYao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logic. In particular, encrypted data can be seen naturally as an abstract datatype. Entailments between security protocols as linear logic theories can be surprisingly strong. We also illustrate how the wellknown connection in linear logic between bipolar formulas and general formulas can be used to show that the asynchronous model of communication given by multiset rewriting rules can be understood, more naturally as asynchronous process calculus (also represented directly as linear logic formulas). The familiar proof theoretic notion of interpolants can also serve to characterize communication between a role and its environment. 1
Abstract Collection Analysis for Horn Clause Programs
"... We consider approximating data structures with collections of the items that they contain. For examples, lists, binary trees, tuples, etc, can be approximated by sets or multisets of the items within them. Such approximations can be used to provide partial correctness properties of logic programs. F ..."
Abstract
 Add to MetaCart
(Show Context)
We consider approximating data structures with collections of the items that they contain. For examples, lists, binary trees, tuples, etc, can be approximated by sets or multisets of the items within them. Such approximations can be used to provide partial correctness properties of logic programs. For example, one might wish to specify than whenever the atom sort(t, s) is proved then the two lists t and s contain the same multiset of items (that is, s is a permutation of t). If sorting removes duplicates, then one would like to infer that the sets of items underlying t and s are the same. Such results could be useful to have if they can be determined statically and automatically. We present a scheme by which such collection analysis can be structured and automated. Central to this scheme is the use of linear logic as a computational logic underlying the logic of Horn clauses.