Process algebraic specifications of distributed systems are increasingly being targeted at identifying security primitives well-suited as high-level programming abstractions, and at the same time adequate for security analysis and verification. Drawing on our earlier work along these lines in [Bugliesi and Focardi 2008], we investigate the expressive power of a core set of security and network abstractions that provide high-level primitives for the specifications of the honest principals in a network as well as the lower-level adversarial primitives that must be assumed available to an attacker. We analyze various bisimulation equivalences for security, arising from endowing the intruder with (i) different adversarial capabilities and (i...
This paper contributes to further closing the gap between formal analysis and concrete implementatio...
This thesis presents a new approach to modelling the security and integrity of data in distributed a...
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic ...
Process algebraic specifications of distributed systems are increasingly being targeted at identifyi...
AbstractProcess algebraic specifications of distributed systems are increasingly being targeted at i...
Process algebraic techniques for distributed systems are increasingly being targeted at identifying ...
In this paper, mostly consisting of definitions, we revisit the models of security protocols: we sho...
International audienceAssembly-level protection mechanisms (virtual memory, trusted execution enviro...
We initiate a program to develop a principled the-ory of secure systems. Our main technical result i...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....
Formal analysis of security protocols has been researched the last decades, recent de-velopments int...
In this paper we prove that attack models and robust declassification in language-based security can...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
Abstract. We present a framework for modeling adversaries in secu-rity protocol analysis, ranging fr...
This paper contributes to further closing the gap between formal analysis and concrete implementatio...
This thesis presents a new approach to modelling the security and integrity of data in distributed a...
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic ...
Process algebraic specifications of distributed systems are increasingly being targeted at identifyi...
AbstractProcess algebraic specifications of distributed systems are increasingly being targeted at i...
Process algebraic techniques for distributed systems are increasingly being targeted at identifying ...
In this paper, mostly consisting of definitions, we revisit the models of security protocols: we sho...
International audienceAssembly-level protection mechanisms (virtual memory, trusted execution enviro...
We initiate a program to develop a principled the-ory of secure systems. Our main technical result i...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....
Formal analysis of security protocols has been researched the last decades, recent de-velopments int...
In this paper we prove that attack models and robust declassification in language-based security can...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
Abstract. We present a framework for modeling adversaries in secu-rity protocol analysis, ranging fr...
This paper contributes to further closing the gap between formal analysis and concrete implementatio...
This thesis presents a new approach to modelling the security and integrity of data in distributed a...
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic ...