28 Hits in 3.9 sec

A Survey of Name-Passing Calculi and Crypto-Primitives [chapter]

Michele Bugliesi, Giuseppe Castagna, Silvia Crafa, Riccardo Forcardi, Vladimiro Sassone
2004 Lecture Notes in Computer Science  
The paper surveys the literature on high-level name-passing process calculi, and their extensions with cryptographic primitives. The survey is by no means exhaustive, for essentially two reasons.  ...  First, in trying to provide a coherent presentation of different ideas and techniques, one inevitably ends up leaving out the approaches that do not fit the intended roadmap.  ...  The remaining sections cover security specific extensions of name-passing calculi.  ... 
doi:10.1007/978-3-540-24631-2_3 fatcat:cjtedz44njfzvntbdzpyj5hjga

Techniques for Security Checking

Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
2002 Electronical Notes in Theoretical Computer Science  
Its relevant security properties are addressed both from a dynamic and static point of view, having operational semantics as a common starting point.  ...  We model, in a process algebra framework, a variant of the well known Wide Mouthed Frog security protocol.  ...  We wish to thank Flemming Nielson and Hanne Riis Nielson for joint work on the CFA topics, and Antonio Durante for joint work on NI topics.  ... 
doi:10.1016/s1571-0661(04)00328-7 fatcat:xq5anwstyfegbltqxpja5kknem

Computationally sound mechanized proofs for basic and public-key Kerberos

B. Blanchet, A. D. Jaggard, A. Scedrov, J.-K. Tsay
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
We present a computationally sound mechanized analysis of Kerberos 5, both with and without its public-key extension PKINIT.  ...  We prove authentication and key secrecy properties using the prover CryptoVerif, which works directly in the computational model; these are the first mechanical proofs of a full industrial protocol at  ...  We are grateful to Michael Backes, Ricardo Corin, John Mitchell, Kenny Paterson, and Arnab Roy for helpful discussions.  ... 
doi:10.1145/1368310.1368326 dblp:conf/ccs/BlanchetJST08 fatcat:nvjdqwa33jaxbdvlkpl4hqvf7m

Measuring security in IoT communications

Chiara Bodei, Stefano Chessa, Letterio Galletta
2019 Theoretical Computer Science  
More smart objects and more applications on the Internet of Things (IoT) mean more security challenges. In IoT security is crucial but difficult to obtain.  ...  On the one hand the usual trade-off between highly secure and usable systems is more impelling than ever; on the other hand security is considered a feature that has a cost often unaffordable.  ...  Our approach follows the well-established line of research about performance evaluation through process calculi and probabilistic model checking (see [10, 11] for a survey).  ... 
doi:10.1016/j.tcs.2018.12.002 fatcat:7tpbkjduojcvzlviczb64an6ni

A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems

Véronique Cortier, Steve Kremer, Bogdan Warinschi
2010 Journal of automated reasoning  
One of the approaches relies on a computational model that considers issues of complexity and probability.  ...  The other approach relies on a symbolic model of protocol executions in which cryptographic primitives are treated as black boxes.  ...  Given a symbolic term T , a distribution [[T ]] A is associated by drawing a random element of the corresponding sort for each name and replacing each function symbol by its computational counterpart.  ... 
doi:10.1007/s10817-010-9187-9 fatcat:6qrlhc34mnbnpmap2mkkrnfqhm

Choreography Rehearsal [chapter]

Chiara Bodei, Gian Luigi Ferrari
2010 Lecture Notes in Computer Science  
We propose a methodology for statically predicting the possible interaction patterns of services within a given choreography.  ...  Control Flow Analysis techniques statically approximate which events can be delivered to match the choreography constraints and how the multicast groups can be optimised to handle event notification within  ...  The syntax of behaviors is modified by the signal emission primitive (out τ c τ ). Note that both topics and sessions are names and are freely interchangeable.  ... 
doi:10.1007/978-3-642-14458-5_2 fatcat:rihprawnxzefdb4jjnvq5bfwxq

From Security Protocols to Systems Security [chapter]

Brian Monahan
2005 Lecture Notes in Computer Science  
In addition, I am grateful for conversations with various protocol workshop participants which directly led to a number of improvements.  ...  Acknowledgements I thank my colleagues Adrian Baldwin, Liqun Chen, Jonathan Griffin, Antonio Lain, Simon Shiu and Mike Wray at HP Labs for their helpful remarks and comments relating to this work.  ...  A context is a collection of named, typed entities.  ... 
doi:10.1007/11542322_37 fatcat:ll3y2zc6nnbvjfivd43czpym54

Formal Models of Bitcoin Contracts: A Survey

Massimo Bartoletti, Roberto Zunino
2019 Frontiers in Blockchain  
In this paper, we survey the formal models proposed in the scientific literature, comparing their expressiveness and applicability in the wild.  ...  Some of these studies introduce formal models of Bitcoin contracts, which specify their behavior in non-ambiguous terms, in some cases providing tools to automatically verify relevant contract properties  ...  Among the primitive combinators, we find pair a b : C ⊢ A× B which constructs a pair with the outputs of functions a : C ⊢ A and b : C ⊢ B.  ... 
doi:10.3389/fbloc.2019.00008 fatcat:d26v5jdvy5gwhpnyolc6zmeata

Logical concepts in cryptography

Simon Kramer
2007 ACM SIGACT News  
In the light of logic, adding PP to a formalism for cryptographic protocols is perhaps also simple and can be achieved with an Ockham's razor extension of an existing core logic, namely CPL.  ...  From the meaning of a cryptographic message, we obtain (1) an equational definition of its context-sensitivity, and (2) a formalisation of the first of Abadi and Needham's principles for prudent engineering  ...  discussions about crypto logics and his constructive criticism of my work; Marc De Falco for his exploratory (now superseded) contribution to my work at an experimental stage; Christoph Frei for his elder-brotherly  ... 
doi:10.1145/1345189.1345205 fatcat:wyk6rfbagbfwrasry7ohjjbq5q

Ownership Types: A Survey [chapter]

Dave Clarke, Johan Östlund, Ilya Sergey, Tobias Wrigstad
2013 Lecture Notes in Computer Science  
This article surveys the various flavours of ownership types that have been developed over the years, along with the many applications and other developments.  ...  Ownership types were devised nearly 15 years ago to provide a stronger notion of protection to object-oriented programming languages.  ...  and the Swedish Research Council within the UPMARC Linnaeus centre of Excellence and the project Structured Aliasing.  ... 
doi:10.1007/978-3-642-36946-9_3 fatcat:inhsxhjizzfrvizsdz5blacu4i

An extended quantum process algebra (eQPAlg) approach for distributed quantum systems [article]

Salman Haider, Dr. Syed Asad Raza Kazmi
2020 arXiv   pre-print
We have further introduced the formal description of protocol by using programs that best explains its working and satisfies the specification.  ...  Examples have been provided to describe the working of the improved algebra that formally explain the sending and receiving of both classical as well as quantum data, keeping in mind the principal features  ...  We also aim to develop an approach for the development of a easy to understand quantum programming language and use our extended form of eQPAlg for modelling and specifying quantum superdense coding and  ... 
arXiv:2001.04249v1 fatcat:zewsusl445d73hkb6snngc5p6y

Twenty First Critical Bibliography of the History and Philosophy of Science and of the History of Civilization (to October 1926)

George Sarton
1927 Isis  
topographical survey carried out at a time when such surveys were exceptional.  ...  From a careful analysis of internal evidence furnished by names and topography, the conclusion is reached that the two last-named charts were largely influenced by earlier Spanish and Portuguese models  ... 
doi:10.1086/358514 fatcat:naj6yo2uardhfjrfoov6ktttqi

Verifying Cryptographic Security Implementations in C Using Automated Model Extraction [article]

Mihhail Aizatulin
2020 arXiv   pre-print
Our method achieves high automation and does not require user input beyond what is necessary to specify the properties of the cryptographic primitives and the desired security goals.  ...  We then perform symbolic execution of that path to extract a model expressed in a process calculus similar to the one used by the CryptoVerif tool.  ...  prior work on verifying security of process calculi.  ... 
arXiv:2001.00806v1 fatcat:bstv42wgazfzbpib4xkoi3iszq

A Formal Approach to Physics-Based Attacks in Cyber-Physical Systems (Extended Version) [article]

Ruggero Lanotte and Massimo Merro and Andrei Munteanu and Luca Viganò
2021 arXiv   pre-print
We focus on a formal treatment of both integrity and denial of service attacks to sensors and actuators of CPSs, and on the timing aspects of these attacks.  ...  estimate the impact of a successful attack on a CPS and investigate possible quantifications of the success chances of an attack. (4)~We illustrate our definitions and results by formalising a non-trivial  ...  Massimo Merro and Andrei Munteanu have been partially supported by the project "Dipartimenti di Eccellenza 2018-2022" funded by the Italian Ministry of Education, Universities and Research (MIUR).  ... 
arXiv:1902.04572v3 fatcat:tvbea3y7t5d6ll5h5o4u62iikq

The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492) Programming Languages for Big Data (PlanBig) (Dagstuhl Seminar 14511) Collective Adaptive Systems: Qualitative and Quantitative Modelling and Analysis (Dagstuhl Seminar 14512)

Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela, Gilles Barthe, Michael Hicks, Florian Kerschbaum, Dominique Unruh, James Cheney, Torsten Grust, Dimitrios (+4 others)
2014 unpublished
To this end, as future work, we intend to use a case study in order to further investigate the interactions between design science and security metrics. Acknowledgements.  ...  Finally, we are interested in the question of whether the design cycle is an effective methodology to use in the development of these metrics, rather than just the evaluation.  ...  Formal reasoning for PL and Crypto Beyond using PLs as a tool for easier/safer use of Crypto, there is an opportunity for certain kinds of thinking, or reasoning, to cross over fruitfully between the PL  ... 
« Previous Showing results 1 — 15 out of 28 results