کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
435685 689926 2010 22 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
پیش نمایش صفحه اول مقاله
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures
چکیده انگلیسی

Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples of such sets of operators comprise XOR, multiplication, abstract encryption/decryption. In this report we give an algorithm for combining decision procedures for arbitrary intruder theories with disjoint sets of operators, provided that solvability of ordered intruder constraints, a slight generalization of intruder constraints, can be decided in each theory. This is the case for most of the intruder theories for which a decision procedure has been given. In particular our result allows us to decide trace-based security properties of protocols that employ any combination of the above mentioned operators with a bounded number of sessions.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Theoretical Computer Science - Volume 411, Issue 10, 4 March 2010, Pages 1261-1282