Siraj, A. Shaikh and Bush, Vicky J and Schneider, Steve A (2009) Specifying authentication using signal events in CSP. Computers and Security, 28 (5). pp. 310-324.Full text not available from this repository.
The formal analysis of cryptographic protocols has firmly developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of security properties, foremost of which is authentication. The formal specification of authentication has long been a subject of examination. In this paper, we discuss the use of correspondence to formally specify authentication and focus on Schneider’s use of signal events in CSP to specify authentication. The purpose of this effort is to strengthen this formalism further. We develop a formal structure for these events and use them to specify a general authentication property. We then develop specifications for recentness and injectivity as sub-properties, and use them to refine authentication further. Our work is motivated by the desire to effectively analyse and express security properties in formal terms, so as to make them precise and clear.
|Subjects:||H Social Sciences > H Social Sciences (General)
T Technology > T Technology (General)
|Divisions:||Faculty of Business, Computing and Applied Sciences > School of Computing and Technology > Technical Computing|
|Research Priority Areas:||Innovation, Design and Technology|
|Depositing User:||Ineke Tijsma|
|Date Deposited:||05 May 2015 15:55|
|Last Modified:||24 Aug 2016 12:13|