A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Capturing parallel attacks within the data independence framework
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and FDR [5]. In particular, we showed how techniques based on data independence [7, 13] could be used to justify, by means of a finite FDR check, systems where agents can perform an unbounded number of protocol runs. Whilst this allows for a more complete analysis, there was one significant incompleteness in the results we
doi:10.1109/csfw.2002.1021813
dblp:conf/csfw/BroadfootR02
fatcat:mcjss3pqcjc53p53ui6mbzz3za