Game semantics model for security protocols

被引:0
|
作者
Debbabi, M [1 ]
Saleh, M [1 ]
机构
[1] Concordia Univ, Comp Secur Lab, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Our aim is to present a game semantics model for the specification of security protocols. Game semantics has been used to give an operational flavor to denotational semantics, thereby combining the best of both worlds by having an elegant mathematical structure and at the same time describing steps of execution. Game semantics was successfully used to prove full abstraction of PCF and has since been used to describe the semantics of a variety of programming languages. It fits naturally in the framework of security protocols as the interactions between communicating parties can be described as moves in a game, where honest agents are the players and the intruder is the opponent. We propose a game-based calculus for the specification of security protocols. First, we define games that represent interactions in security protocols, these games are then used to ascribe denotational semantics to security protocols.
引用
收藏
页码:125 / 140
页数:16
相关论文
共 50 条
  • [21] Parallel Bounded Model Checking of Security Protocols
    Kurkowski, Miroslaw
    Siedlecka-Lamch, Olga
    Szymoniak, Sabina
    Piech, Henryk
    PARALLEL PROCESSING AND APPLIED MATHEMATICS (PPAM 2013), PT I, 2014, 8384 : 224 - 234
  • [22] LDYIS: a Framework for Model Checking Security Protocols
    Lomuscio, Alessio
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2008, 85 (1-4) : 359 - 375
  • [23] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [24] An intruder model for verifying liveness in security protocols
    Department of Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands
    不详
    Proc. Fourth ACM Workshop Formal Methods Secur. Eng. FMSE Conf.Comput. Commun. Secur., 2006, (23-32):
  • [25] A generic model for symbolic analyzing security protocols
    Gu, YG
    Fu, YX
    Li, Y
    Dong, XJ
    Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 680 - 684
  • [26] An intruder model with message inspection for model checking security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    COMPUTERS & SECURITY, 2010, 29 (01) : 16 - 34
  • [27] Towards a Game-Theoretic Security Analysis of Off-Chain Protocols
    Rain, Sophie
    Avarikioti, Georgia
    Kovacs, Laura
    Maffei, Matteo
    2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, : 107 - 122
  • [28] Game semantics and subtyping
    Chroboczek, J
    15TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2000, : 192 - 203
  • [29] Probabilistic game semantics
    Danos, V
    Harmer, R
    15TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2000, : 204 - 213
  • [30] Dynamic game semantics
    Janasik, T
    Sandu, G
    MEANING: THE DYNAMIC TURN, 2003, 12 : 215 - 240