Results 1 
3 of
3
Security properties and CSP
, 1995
"... Security properties such as confidentiality and authenticity may be considered in terms of the flow of messages within a network. To the extent that this characterisation is justified, the use of a process algebra such as Communicating Sequential Processes (CSP) seems appropriate to describe and ana ..."
Abstract

Cited by 116 (3 self)
 Add to MetaCart
Security properties such as confidentiality and authenticity may be considered in terms of the flow of messages within a network. To the extent that this characterisation is justified, the use of a process algebra such as Communicating Sequential Processes (CSP) seems appropriate to describe and analyse them. This paper explores ways in which security properties may be described as CSP specifications, how security mechanisms may be captured, and how particular protocols designed to provide these properties may be analysed within the CSP framework. The paper is concerned with the theoretical basis for such analysis. A sketch verification of a simple example is carried out as an illustration. 1 Introduction Security protocols are designed to provide properties such as authentication, key exchanges, key distribution, nonrepudiation, proof of origin, integrity, confidentiality and anonymity, for users who wish to exchange messages over a medium over which they have little control. These ...
Density and Choice for Total Continuous Functionals
 About and Around Georg Kreisel
, 1996
"... this paper is to give complete proofs of the density theorem and the choice principle for total continuous functionals in the natural and concrete context of the partial continuous functionals [Ers77], essentially by specializing more general treatments in the literature. The proofs obtained are rel ..."
Abstract

Cited by 8 (3 self)
 Add to MetaCart
this paper is to give complete proofs of the density theorem and the choice principle for total continuous functionals in the natural and concrete context of the partial continuous functionals [Ers77], essentially by specializing more general treatments in the literature. The proofs obtained are relatively short and hopefully perspicious, and may contribute to redirect attention to the fundamental questions Kreisel originally was interested in. Obviously this work owes much to other sources. In particular I have made use of work by Scott [Sco82] (whose notion of an information system is taken as a basis to introduce domains), Roscoe [Ros87], Larsen and Winskel [LW84] and Berger [Ber93]. The paper is organized as follows. Section 1 treats information systems, and in section 2 it is shown that the partial orders defined by them are exactly the (Scott) domains with countable basis. Section 3 gives a characterization of the continuous functions between domains, in terms of approximable mappings. In section 4 cartesian products and function spaces of domains and information systems are introduced. In section 5 the partial and total continuous functionals are defined. Section 6 finally contains the proofs of the two theorems above; it will be clear that the same proofs also yield effective versions of these theorems.
TLS ANALYSIS USING CADP
"... Abstract. This paper reports on an analysis of the Transport Layer Security protocol [DA99], TLS. We have used LOTOS [BB88] to model TLS, the calculus [Koz83] to express security properties that we wish it to meet and CADP [FGK+96] to conduct formal analysis. Both the specification and the analysis ..."
Abstract
 Add to MetaCart
Abstract. This paper reports on an analysis of the Transport Layer Security protocol [DA99], TLS. We have used LOTOS [BB88] to model TLS, the calculus [Koz83] to express security properties that we wish it to meet and CADP [FGK+96] to conduct formal analysis. Both the specification and the analysis closely follow Steve Schneider’s [Sch96a] approach to the verification of security protocols. We show how we adapted Schneider’s approach and applied it to the analysis of TLS, using different formalisms and proof methods. We report on the security properties that TLS is proved to enjoy. 1.