AbstractProcess algebraic specifications of distributed systems are increasingly being targeted at identifying security primitives well-suited as high-level programming abstractions, and at the same time adequate for security analysis and verification. Drawing on our earlier work along these lines [Bugliesi, M. and R. Focardi, Language based secure communication, in: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, 23-25 June 2008 (2008), pp. 3–16], we investigate the expressive power of a core set of security and network abstractions that provide high-level primitives for the specifications of the honest principals in a network as well as the lower-level adversarial primitives that m...
Communication in distributed systems often relies on useful abstractions such as channels, remote pr...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
In this paper we prove that attack models and information released in language-based security can be...
Process algebraic specifications of distributed systems are increasingly being targeted at identifyi...
AbstractProcess algebraic specifications of distributed systems are increasingly being targeted at i...
Process algebraic techniques for distributed systems are increasingly being targeted at identifying ...
In this paper we prove that attack models and robust declassification in language-based security can...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....
In this paper, mostly consisting of definitions, we revisit the models of security protocols: we sho...
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic ...
Formal analysis of security protocols has been researched the last decades, recent de-velopments int...
Abstract. We are interested in computationally sound implementations for languages of distributed co...
We present a process algebraic intruder model for verifying a class of liveness properties of securi...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
Abstract. We present a framework for modeling adversaries in secu-rity protocol analysis, ranging fr...
Communication in distributed systems often relies on useful abstractions such as channels, remote pr...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
In this paper we prove that attack models and information released in language-based security can be...
Process algebraic specifications of distributed systems are increasingly being targeted at identifyi...
AbstractProcess algebraic specifications of distributed systems are increasingly being targeted at i...
Process algebraic techniques for distributed systems are increasingly being targeted at identifying ...
In this paper we prove that attack models and robust declassification in language-based security can...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....
In this paper, mostly consisting of definitions, we revisit the models of security protocols: we sho...
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic ...
Formal analysis of security protocols has been researched the last decades, recent de-velopments int...
Abstract. We are interested in computationally sound implementations for languages of distributed co...
We present a process algebraic intruder model for verifying a class of liveness properties of securi...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
Abstract. We present a framework for modeling adversaries in secu-rity protocol analysis, ranging fr...
Communication in distributed systems often relies on useful abstractions such as channels, remote pr...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
In this paper we prove that attack models and information released in language-based security can be...