A Uniform Approach for the Definition of Security Properties
Riccardo Focardi,Fabio Martinelli +1 more
- pp 794-813
Reads0
Chats0
TLDR
It is shown that the results of the theory can be easily applied to a number of existing security properties that can be rephrased in the authors' setting and permits to find some interesting relations among properties which have been proposed for different security issues.Abstract:
We present a uniform approach for the definition and the analysis of various security properties. It is based on the general idea that a security property should be satisfied even in the presence of an hostile environment. This principle determines a family of strong properties which are resistant to every external attack, but are quite impractical to check. For this reason, we find some general conditions that permit to check a property only against a "most powerful" intruder. We show that the results of our theory can be easily applied to a number of existing security properties that can be rephrased in our setting. This shows the generality of the approach and permits to find some interesting relations among properties which have been proposed for different security issues.read more
Citations
More filters
Scyther : semantics and verification of security protocols
TL;DR: This thesis develops a formal model for the description and analysis of security protocols at the process level, and develops an automated veri??cation procedure, which improves over existing methods and is applied in two novel case studies.
Classification of Security Properties (Part I: Information Flow)
TL;DR: In this paper, many non-interference-like properties proposed for computer security are classified and compared in a unifying framework and the resulting taxonomy is evaluated through some case studies of access control in computer systems.
Book ChapterDOI
Non Interference for the Analysis of Cryptographic Protocols
TL;DR: Many security properties of cryptographic protocols can be all seen as specific instances of a general property, called Non Deducibility on Composition (NDC), that was proposed a few years ago for studying information flow properties in computer systems.
Proceedings ArticleDOI
Information flow analysis in a discrete-time process algebra
TL;DR: This work reformulated the Security Process Algebra of Focardi and Gorrieri with some extra constructs to model real-time systems and proves essentially the same results known for the untimed case: ordering relation among properties, compositionality aspects, partial model checking techniques.
Conceptual Model and Architecture for MAFTIA
TL;DR: The files are stored in PDF, with the report number as filename, and are available by post from the above address.
References
More filters
Journal ArticleDOI
Communicating sequential processes
TL;DR: It is suggested that input and output are basic primitives of programming and that parallel composition of communicating sequential processes is a fundamental program structuring method.
Book
Communication and Concurrency
TL;DR: This chapter discusses Bisimulation and Observation Equivalence as a Modelling Communication, a Programming Language, and its application to Equational laws.
Journal ArticleDOI
On the security of public key protocols
Danny Dolev,Andrew Chi-Chih Yao +1 more
TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Proceedings ArticleDOI
Security Policies and Security Models
Joseph A. Goguen,José Meseguer +1 more
TL;DR: The reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts.