AbstractThe distributed temporal logic DTL is an expressive logic, well suited for formalizing properties of concurrent, communicating agents. We show how DTL can be used as a metalogic to reason about and relate different security protocol models. This includes reasoning about model simplifications, where models are transformed to have fewer agents or behaviors, and verifying model reductions, where to establish the validity of a property it suffices to consider its satisfaction on only a subset of models.We illustrate how DTL can be used to formalize security models, protocols, and properties, and then present three concrete examples of metareasoning. First, we prove a general theorem about sufficient conditions for data to remain secret ...
Traditional security protocols are mainly concerned with authentication and key establishment and re...
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an age...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
The distributed temporal logic DTL is an expressive logic, well suited for formalizing properties of...
The distributed temporal logic DTL is an expressive logic, well-suited for formalizing properties of...
AbstractThe distributed temporal logic DTL is an expressive logic, well suited for formalizing prope...
We introduce a version of distributed temporal logic for rigorously formalizing and proving metaleve...
AbstractWe introduce a version of distributed temporal logic for rigorously formalizing and proving ...
Running critical applications, such as e-commerce, in a distributed environment requires assurance o...
Securing communication in large scale distributed systems is an open problem. When multiple principa...
Securing communication in large scale distributed systems is an open problem. When multiple principa...
The notion of time is prerequisite for describing and verifying the security properties of key manag...
AbstractTemporal logics of knowledge are useful for reasoning about situations where the knowledge o...
Designing authentication protocols is an error-prone process. In this paper, we develop a deductive ...
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an age...
Traditional security protocols are mainly concerned with authentication and key establishment and re...
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an age...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
The distributed temporal logic DTL is an expressive logic, well suited for formalizing properties of...
The distributed temporal logic DTL is an expressive logic, well-suited for formalizing properties of...
AbstractThe distributed temporal logic DTL is an expressive logic, well suited for formalizing prope...
We introduce a version of distributed temporal logic for rigorously formalizing and proving metaleve...
AbstractWe introduce a version of distributed temporal logic for rigorously formalizing and proving ...
Running critical applications, such as e-commerce, in a distributed environment requires assurance o...
Securing communication in large scale distributed systems is an open problem. When multiple principa...
Securing communication in large scale distributed systems is an open problem. When multiple principa...
The notion of time is prerequisite for describing and verifying the security properties of key manag...
AbstractTemporal logics of knowledge are useful for reasoning about situations where the knowledge o...
Designing authentication protocols is an error-prone process. In this paper, we develop a deductive ...
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an age...
Traditional security protocols are mainly concerned with authentication and key establishment and re...
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an age...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...