scispace - formally typeset
Open AccessBook ChapterDOI

A Uniform Approach for the Definition of Security Properties

Riccardo Focardi, +1 more
- pp 794-813
Reads0
Chats0
TLDR
It is shown that the results of the theory can be easily applied to a number of existing security properties that can be rephrased in the authors' setting and permits to find some interesting relations among properties which have been proposed for different security issues.
Abstract
We present a uniform approach for the definition and the analysis of various security properties. It is based on the general idea that a security property should be satisfied even in the presence of an hostile environment. This principle determines a family of strong properties which are resistant to every external attack, but are quite impractical to check. For this reason, we find some general conditions that permit to check a property only against a "most powerful" intruder. We show that the results of our theory can be easily applied to a number of existing security properties that can be rephrased in our setting. This shows the generality of the approach and permits to find some interesting relations among properties which have been proposed for different security issues.

read more

Content maybe subject to copyright    Report

Citations
More filters

Scyther : semantics and verification of security protocols

Cas Cremers
TL;DR: This thesis develops a formal model for the description and analysis of security protocols at the process level, and develops an automated veri??cation procedure, which improves over existing methods and is applied in two novel case studies.

Classification of Security Properties (Part I: Information Flow)

TL;DR: In this paper, many non-interference-like properties proposed for computer security are classified and compared in a unifying framework and the resulting taxonomy is evaluated through some case studies of access control in computer systems.
Book ChapterDOI

Non Interference for the Analysis of Cryptographic Protocols

TL;DR: Many security properties of cryptographic protocols can be all seen as specific instances of a general property, called Non Deducibility on Composition (NDC), that was proposed a few years ago for studying information flow properties in computer systems.
Proceedings ArticleDOI

Information flow analysis in a discrete-time process algebra

TL;DR: This work reformulated the Security Process Algebra of Focardi and Gorrieri with some extra constructs to model real-time systems and proves essentially the same results known for the untimed case: ordering relation among properties, compositionality aspects, partial model checking techniques.

Conceptual Model and Architecture for MAFTIA

D Powell, +1 more
TL;DR: The files are stored in PDF, with the report number as filename, and are available by post from the above address.
References
More filters
Journal ArticleDOI

Communicating sequential processes

TL;DR: It is suggested that input and output are basic primitives of programming and that parallel composition of communicating sequential processes is a fundamental program structuring method.
Book

Communication and Concurrency

TL;DR: This chapter discusses Bisimulation and Observation Equivalence as a Modelling Communication, a Programming Language, and its application to Equational laws.
Journal ArticleDOI

On the security of public key protocols

TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Proceedings ArticleDOI

Security Policies and Security Models

TL;DR: The reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts.