scholarly journals Operational Semantics of Security Protocols

Author(s):  
Cas Cremers ◽  
Sjouke Mauw
2000 ◽  
Vol 7 (18) ◽  
Author(s):  
Federico Crazzolara ◽  
Glynn Winskel

In this report we present a process language for security protocols together<br />with an operational semantics and an alternative semantics in terms of sets<br /> of events. The denotation of process is a set of events, and as each event specifies<br /> a set of pre- and postconditions, this denotation can be viewed as a Petri net.<br />This Petri-net semantics has a strong relation to both Paulson's inductive set<br />of rules [Pau98] and strand spaces [THG98c]. By means of an example we<br />illustrate how the Petri-net semantics can be used to prove properties such as<br />secrecy and authentication.


Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


Author(s):  
Tobias Käfer ◽  
Benjamin Jochum ◽  
Nico Aßfalg ◽  
Leonard Nürnberg

AbstractFor Read-Write Linked Data, an environment of reasoning and RESTful interaction, we investigate the use of the Guard-Stage-Milestone approach for specifying and executing user agents. We present an ontology to specify user agents. Moreover, we give operational semantics to the ontology in a rule language that allows for executing user agents on Read-Write Linked Data. We evaluate our approach formally and regarding performance. Our work shows that despite different assumptions of this environment in contrast to the traditional environment of workflow management systems, the Guard-Stage-Milestone approach can be transferred and successfully applied on the web of Read-Write Linked Data.


2021 ◽  
Vol 181 (1) ◽  
pp. 1-35
Author(s):  
Jane Hillston ◽  
Andrea Marin ◽  
Carla Piazza ◽  
Sabina Rossi

In this paper, we study an information flow security property for systems specified as terms of a quantitative Markovian process algebra, namely the Performance Evaluation Process Algebra (PEPA). We propose a quantitative extension of the Non-Interference property used to secure systems from the functional point view by assuming that the observers are able to measure also the timing properties of the system, e.g., the response time of certain actions or its throughput. We introduce the notion of Persistent Stochastic Non-Interference (PSNI) based on the idea that every state reachable by a process satisfies a basic Stochastic Non-Interference (SNI) property. The structural operational semantics of PEPA allows us to give two characterizations of PSNI: one based on a bisimulation-like equivalence relation inducing a lumping on the underlying Markov chain, and another one based on unwinding conditions which demand properties of individual actions. These two different characterizations naturally lead to efficient methods for the verification and construction of secure systems. A decision algorithm for PSNI is presented and an application of PSNI to a queueing system is discussed.


Author(s):  
Segundo Moises Toapanta Toapanta ◽  
Luis Enrique Mafla Gallegos ◽  
Alex Enrique Aranda Alvarado ◽  
Maximo Prado Solis

Sign in / Sign up

Export Citation Format

Share Document