Filters








49,480 Hits in 4.2 sec

Proving Security Goals With Shape Analysis Sentences [article]

John D. Ramsdell
2014 arXiv   pre-print
The result is a semantically rich environment in which the validity of a security goal can be determined using shape analysis sentences and the foundation on which they are based.  ...  The paper that introduced shape analysis sentences presented a method for extracting a sentence in first-order logic that completely characterizes a run of CPSA.  ...  Given a shape analysis sentence, a security goal is achieved if the goal can be deduced from the sentence. cpsa includes a Prolog program that translates shape analysis sentences into Prover9 [11] syntax  ... 
arXiv:1403.3563v1 fatcat:b7t7m5gtgvfohnjrrhoitktzea

Deducing Security Goals From Shape Analysis Sentences [article]

John D. Ramsdell
2018 arXiv   pre-print
Guttman presented a model-theoretic approach to establishing security goals in the context of Strand Space theory.  ...  In his approach, a run of the Cryptographic Protocol Shapes Analyzer (CPSA) produces models that determine if a goal is satisfied.  ...  Using Horn clauses for analyzing security protocols.  ... 
arXiv:1204.0480v4 fatcat:cetsaf7zvvefdar47ymw5zkw54

A Hybrid Analysis for Security Protocols with State [article]

John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe
2014 arXiv   pre-print
We define a hybrid analysis method. It leverages theorem-proving---in this instance, the PVS prover---for reasoning about computations over state.  ...  It combines that with an "enrich-by-need" approach---embodied by CPSA---that focuses on the message-passing part. As a case study we give a full analysis of the Envelope Protocol, due to Mark Ryan.  ...  A sentence, called a shape analysis sentence [22, 15] , summarizes its results in a sentence in the language Figure 1 : Theory Inclusions of T bnd (Π).  ... 
arXiv:1404.3899v2 fatcat:rqly23p52baopntch3srghc3p4

Homomorphisms and Minimality for Enrich-by-Need Security Analysis [article]

Daniel J. Dougherty and Joshua D. Guttman and John D. Ramsdell
2018 arXiv   pre-print
LPA uses two programs, cooperating with each other: CPSA, a well-known system for protocol analysis, and Razor, a model-finder based on SMT technology.  ...  Our analysis follows the enrich-by-need paradigm, in which models of protocol execution are generated and examined.  ...  We regard the shape analysis as a security goal achieved by G ∪ T h(Π). Thus, finding a finite set of finite shapes determines a strongest security goal that the system achieves.  ... 
arXiv:1804.07158v1 fatcat:adpji3ailnhkfnopcbq5jdlpne

A Hybrid Analysis for Security Protocols with State [chapter]

John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe
2014 Lecture Notes in Computer Science  
We define a hybrid analysis method. It leverages theorem-proving-in this instance, the PVS prover-for reasoning about computations over state.  ...  It combines that with an "enrich-by-need" approach-embodied by CPSA-that focuses on the message-passing part. As a case study we give a full analysis of the Envelope Protocol, due to Mark Ryan.  ...  Its results may be summarized in a sentence, called a shape analysis sentence [21] , [16] , in the language of T bnd (Π).  ... 
doi:10.1007/978-3-319-10181-1_17 fatcat:4kmccmwlivespethjr5bbw4xli

Damaska and the Faces of International Criminal Justice

B. Swart
2008 Journal of International Criminal Justice  
Goals of a conflict-solving nature are best served by a legal process structured as a contest between two parties  ...  Consequently, all proceedings take the shape of a contest between two parties. In the reactive state, on the other hand, all law is an expression of state policies.  ...  Sentencing goals might well have stronger procedural consequences for the shape of separate sentencing proceedings, resulting in separate sentencing judgments.  ... 
doi:10.1093/jicj/mqm082 fatcat:x3z2wxnqqvf77a5dp3k7lltcly

An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents

Ying He, Chris Johnson, Karen Renaud, Yu Lu, Salem Jebriel
2014 2014 6th International Conference on Computer Science and Information Technology (CSIT)  
Moreover, this paper has empirically evaluated this approach to the creation of a Generic Security Template; this provides users with an overview of the lessons derived from security incidents at a level  ...  In particular, it adapts the graphical Goal Structuring Notation (GSN), to present lessons learned in a structured manner by mapping them to the security requirements of the ISMS.  ...  to its relationships with the goals.  ... 
doi:10.1109/csit.2014.6805998 fatcat:v5kokd6op5adtdusyhwr52zqf4

Security Theorems via Model Theory

Joshua Guttman
2009 Electronic Proceedings in Theoretical Computer Science  
Hence, to verify a security goal, one can use the Cryptographic Protocol Shapes Analyzer CPSA (TACAS, 2007) to identify minimal realized skeletons, or "shapes," that are homomorphic images of A_phi.  ...  If psi holds in each of these shapes, then the goal holds.  ...  A sentence ∀ x . (φ ⊃ ∃ y . ψ) is a security goal if (1) the xs and ys are disjoint; (2) φ is a security claim; and (3) ψ is a disjunction i φ i of conjunctions φ i of atomic formulas.  ... 
doi:10.4204/eptcs.8.5 fatcat:37xnoriakfhgdnbikltzkz6pli

Auditing User-Provided Axioms in Software Verification Conditions [chapter]

Paul Jackson, Florian Schanda, Angela Wallenburg
2013 Lecture Notes in Computer Science  
Such axioms can also describe properties of constants, functions and relations that are introduced to help with program specification.  ...  Prover-hint axioms address incompletenesses in automatic provers, their failure to prove VCs that are logically valid.  ...  The results obtained with main approaches are dependent on the theorem proving power of the selected prover.  ... 
doi:10.1007/978-3-642-41010-9_11 fatcat:x67mvo77d5fzxp7jtywn2klhwq

The role of innovation and wealth in the net neutrality debate: A content analysis of human values in congressional and FCC hearings

An-Shou Cheng, Kenneth R. Fleischmann, Ping Wang, Emi Ishita, Douglas W. Oard
2012 Journal of the American Society for Information Science and Technology  
We examine the role of human values in shaping the Net neutrality debate through a content analysis of testimonies from U.S. Senate and FCC hearings on Net neutrality.  ...  The analysis is based on a coding scheme that we developed based on a pilot study in which we used the Schwartz Value Inventory.  ...  The unit of analysis was the sentence, although we interpreted each sentence within its context within the document.  ... 
doi:10.1002/asi.22646 fatcat:njucilnnrrfx3ozdz3rcooz6uu

Efficient symbolic automated analysis of administrative attribute-based RBAC-policies

Francesco Alberti, Alessandro Armando, Silvio Ranise
2011 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11  
State-of-the-art automated theorem proving techniques are used (off-the-shelf) to mechanize the security analysis procedure.  ...  In this paper, we describe an automated symbolic security analysis technique for administrative attribute-based RBAC policies.  ...  generalize the decidability results for security analysis problems obtained in [18] .  ... 
doi:10.1145/1966913.1966935 dblp:conf/ccs/AlbertiAR11 fatcat:srjq6nrmjre7xdgulkhbqc3kqy

Semantic Prosody of [pendidikan/education] from Khaled Nordin's Perspective: An Analysis of Speech Texts based on Corpus Linguistic Methodology

Hishamudin Isam, Mohd Izani Mohd Zain, Mashetoh Abd Mutalib, Rohaidah Haron
2014 Procedia - Social and Behavioral Sciences  
The situation is thus able to prove that there are explicit and implicit links between the reality of the language usage and the social reality of its users.  ...  Armed with such commitment, Higher Education Minister, Datuk Seri Mohamed Khaled Nordin in his speeches often reveals the diversity of education issues in Malaysia particularly in relation to education  ...  Besides contributing to language and linguistic fields, this study also aims to help researchers from different research fields/disciplines, to 'get acquainted' with the key figure in Malaysia's higher  ... 
doi:10.1016/j.sbspro.2014.02.023 fatcat:ezau6zxamvatvhtg3pmpd74tni

The Limits of Judicial Idealism: Should the International Criminal Court Engage with Consequentialist Aspirations?

Shahram Dana
2013 Social Science Research Network  
Moreover, the goals they seek to achieve with their sentencing reductions, like reconciliation, are beyond the immediate capacity of criminal courts.  ...  that the goal of deterrence may legitimately influence the sentence.  ...  However, Sikirica was also charged with genocide.  ... 
doi:10.2139/ssrn.2205172 fatcat:f34sasvqwnhavhywqvsau37a3q

(De)legitimating electronic surveillance: a critical discourse analysis of the Finnish news coverage of the Edward Snowden revelations

Minna Tiainen
2017 Critical Discourse Studies  
The importance of the constructed goal is highlighted in the second and third sentences with the equation of security and terrorism prevention, utilizing the post 9/11 understanding of threat discussed  ...  The second sentence emphasizes the validity of the goal by presenting it as a presupposed fact, needing no justification.  ... 
doi:10.1080/17405904.2017.1320296 fatcat:7soubulfi5arhaw3aeq7tjozse

Us Presidents' Political Discourse Analysis: George W. Bush and Barack Obama. A Pragmatics Approach

Abbas Hussein Tarish
2019 Romanian Journal of English Studies  
Politicians shape their discourse based on the setting in which they are communicating, which also shapes what, specifically, the politicians want to convey.  ...  Politicians shape their discourse based on the setting in which they are communicating, which also shapes what, specifically, the politicians want to convey.  ... 
doi:10.1515/rjes-2019-0016 fatcat:2ls7mftoqvckhe5yey2xu74fgm
« Previous Showing results 1 — 15 out of 49,480 results