Access Restriction

Author Schneider, Steve ♦ Holloway, Royal
Source CiteSeerX
Content type Text
Publisher IEEE Computer Society Press
File Format PDF
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Security Mechanism ♦ Csp Framework ♦ Simple Example ♦ Particular Protocol ♦ Security Property ♦ Key Distribution ♦ Sketch Verification ♦ Little Control ♦ Theoretical Basis ♦ Process Algebra ♦ Key Exchange ♦ Introduction Security Protocol ♦ Sequential Process ♦ Csp Specification
Description Security properties such as confidentiality and authenticity may be considered in terms of the flow of messages within a network. To the extent that this characterisation is justified, the use of a process algebra such as Communicating Sequential Processes (CSP) seems appropriate to describe and analyse them. This paper explores ways in which security properties may be described as CSP specifications, how security mechanisms may be captured, and how particular protocols designed to provide these properties may be analysed within the CSP framework. The paper is concerned with the theoretical basis for such analysis. A sketch verification of a simple example is carried out as an illustration. 1 Introduction Security protocols are designed to provide properties such as authentication, key exchanges, key distribution, non-repudiation, proof of origin, integrity, confidentiality and anonymity, for users who wish to exchange messages over a medium over which they have little control. These ...
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Learning Resource Type Article
Publisher Date 1995-01-01