Results 1  10
of
4,003
PatternMatching SpiCalculus
 In Formal Aspects in Security and Trust
, 2004
"... Abstract. Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on types for authenticity did not allow for such nested cryptography. In this work, we present the patternmatching s ..."
Abstract

Cited by 18 (0 self)
 Add to MetaCart
spicalculus, which is an obvious extension of the spicalculus to include patternmatching as primitive. The novelty of the language is in the accompanying type system, which uses the same language of patterns to describe complex data dependencies which cannot be described using prior type systems
A calculus for cryptographic protocols: The spi calculus
 Information and Computation
, 1999
"... We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the ..."
Abstract

Cited by 919 (55 self)
 Add to MetaCart
We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols
On the semantics of Alice&Bob specifications of security protocols
 Theoretical Computer Science
, 2006
"... In the context of security protocols, the socalled Alice&Bob notation is often used to describe the messages exchanged between honest principals in successful protocol runs. While intuitive, this notation is ambiguous in its description of the actions taken by principals, in particular with res ..."
Abstract

Cited by 17 (2 self)
 Add to MetaCart
operational semantics, which is guided by the denotational semantics, implements each role of the specified protocol as a sequential process of the patternmatching spi calculus.
A BRUTUS Logic for a SpiCalculus Dialect
"... In the field of process algebras, the spicalculus, a modified version of the calculus with encryption primitives, is indicated as an expressive specification language for cryptographic protocols. In spicalculus basic security properties, such as secrecy and integrity can be formalized as may ..."
Abstract
 Add to MetaCart
In the field of process algebras, the spicalculus, a modified version of the calculus with encryption primitives, is indicated as an expressive specification language for cryptographic protocols. In spicalculus basic security properties, such as secrecy and integrity can be formalized as may
A MultiRole Translation of Protocol Narration into the SpiCalculus with Correspondence Assertions ⋆
"... Abstract. We present an interpretation of protocol narrations by means of translation into the spicalculus. Our translation allows participants to play multiple roles in parallel, leading to a more general interpretation that considers a wider range of attacks than previous work. We test the validi ..."
Abstract
 Add to MetaCart
Abstract. We present an interpretation of protocol narrations by means of translation into the spicalculus. Our translation allows participants to play multiple roles in parallel, leading to a more general interpretation that considers a wider range of attacks than previous work. We test
LanguageBased InformationFlow Security
 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
, 2003
"... Current standard security practices do not provide substantial assurance that the endtoend behavior of a computing system satisfies important security policies such as confidentiality. An endtoend confidentiality policy might assert that secret input data cannot be inferred by an attacker throug ..."
Abstract

Cited by 821 (57 self)
 Add to MetaCart
Current standard security practices do not provide substantial assurance that the endtoend behavior of a computing system satisfies important security policies such as confidentiality. An endtoend confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attacker's observations of system output; this policy regulates information flow.
Goaldirected Requirements Acquisition
 SCIENCE OF COMPUTER PROGRAMMING
, 1993
"... Requirements analysis includes a preliminary acquisition step where a global model for the specification of the system and its environment is elaborated. This model, called requirements model, involves concepts that are currently not supported by existing formal specification languages, such as goal ..."
Abstract

Cited by 572 (17 self)
 Add to MetaCart
Requirements analysis includes a preliminary acquisition step where a global model for the specification of the system and its environment is elaborated. This model, called requirements model, involves concepts that are currently not supported by existing formal specification languages, such as goals to be achieved, agents to be assigned, alternatives to be negotiated, etc. The paper presents an approach to requirements acquisition which is driven by such higherlevel concepts. Requirements models are acquired as instances of a conceptual metamodel. The latter can be represented as a graph where each node captures an abstraction such as, e.g., goal, action, agent, entity, or event, and where the edges capture semantic links between such abstractions. Wellformedness properties on nodes and links constrain their instances  that is, elements of requirements models. Requirements acquisition processes then correspond to particular ways of traversing the metamodel graph to acquire approp...
The Spi Calculus
 In Computer and Communications Security
, 1997
"... The charter of SRC is to advance both the state of knowledge and the state of the art in computer systems. From our establishment in 1984, we have performed basic and applied research to support Digital’s business objectives. Our current work includes exploring distributed personal computing on mult ..."
Abstract

Cited by 4 (0 self)
 Add to MetaCart
publication in professional journals and conferences. We seek users for our prototype systems among those with whom we have common interests, and we encourage collaboration with university researchers. A Calculus for Cryptographic Protocols
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
, 2000
"... Two distinct, rigorous views of cryptography have developed over the years, in two mostly separate communities. One of the views relies on a simple but effective formal approach; the other, on a detailed computational model that considers issues of complexity and probability. ..."
Abstract

Cited by 389 (18 self)
 Add to MetaCart
Two distinct, rigorous views of cryptography have developed over the years, in two mostly separate communities. One of the views relies on a simple but effective formal approach; the other, on a detailed computational model that considers issues of complexity and probability.
Results 1  10
of
4,003