کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
10341175 | 695366 | 2005 | 10 صفحه PDF | دانلود رایگان |
عنوان انگلیسی مقاله ISI
A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols
دانلود مقاله + سفارش ترجمه
دانلود مقاله ISI انگلیسی
رایگان برای ایرانیان
موضوعات مرتبط
مهندسی و علوم پایه
مهندسی کامپیوتر
شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله

چکیده انگلیسی
In the areas of computer security and cryptographic protocols a standard model for describing the malicious behaviour of adversaries is the Dolev-Yao threat model. In formal analysis of complex, reactive and concurrent communication systems, a well-researched algebraic process approach is Milner's Calculus of Communicating Systems (CCS) which has the semantic foundation underpinned by Plotkin's structured operational semantics (SOS). In this article we provide a CCS-SOS modelling of the Dolev-Yao threat environment and its composition with the CCS description of a cryptographic protocol. For a given protocol, we attempt to discover security flaws by examining whether there is any difference between the SOS transition behaviours of the protocol descriptions which has and has not been composed with the malicious environment. The intuitively appealing modelling shows a suitability for the well-researched CCS-SOS-based algebraic process approach being applied to formal analysis of cryptographic protocols.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computer Standards & Interfaces - Volume 27, Issue 5, June 2005, Pages 479-488
Journal: Computer Standards & Interfaces - Volume 27, Issue 5, June 2005, Pages 479-488
نویسندگان
Wenbo Mao,