首页> 外文期刊>Formal Aspects of Computing >Compositional refinement in agent-based security protocols
【24h】

Compositional refinement in agent-based security protocols

机译:基于代理的安全协议中的构成优化

获取原文
获取原文并翻译 | 示例
           

摘要

A truly secure protocol is one which never violates its security requirements, no matter how bizarre the circumstances, provided those circumstances are within its terms of reference. Such cast-iron guarantees, as far as they are possible, require formal, rigorous techniques: proof or model-checking. Informally, they are difficult or impossible to achieve. Our rigorous technique is refinement, until recently not much applied to security. We argue its benefits by using refinement-based program algebra to develop several security case studies. That is one of our contributions here. The soundness of the technique follows from its compositional semantics, one which we denned (elsewhere) to support a specialisation of standard refinement by enriching standard semantics with information that tracks correlations between hidden state and visible behaviour. A further contribution is to extend the basic theory of secure refinement (Morgan in Mathematics of program construction, Springer, Berlin, vol. 4014, pp. 359-378, 2006) with special features required by our case studies, namely agent-based systems with complementary security requirements, and looping programs.
机译:真正安全的协议是一种永远不会违反其安全要求的协议,无论这种情况多么奇怪,只要这些情况在其职权范围之内。此类铸铁保证尽可能地需要正式,严格的技术:证明或模型检查。非正式地,它们很难或不可能实现。我们严格的技术是精细化,直到最近才在安全性方面应用不多。我们通过使用基于优化的程序代数来开发一些安全案例研究来论证其好处。这是我们在这里的贡献之一。该技术的健全性源于其组成语义,我们通过在其他地方进行了定义,以通过跟踪信息来隐藏标准状态与可见行为之间的相关性,从而丰富标准语义,以支持标准改进的专业化。进一步的贡献是扩展了安全细化的基本理论(Morgan in program of construction的数学程序,柏林,Springer,第4014卷,第359-378页,2006年),具有我们案例研究所需的特殊功能,即基于主体的系统具有补充的安全要求和循环程序。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号