Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: WITS'03
Guest editors: Roberto Gorrieri
Article type: Research Article
Authors: Bistarelli, Stefanoa; b | Cervesato, Ilianoc | Lenzini, Gabrieled; e | Martinelli, Fabioa
Affiliations: [a] Istituto di Informatica e Telematica – CNR, Via G. Moruzzi 1, I-56100 Pisa, Italy. E-mail: stefano.bistarelli@iit.cnr.it, fabio.martinelli@iit.cnr.it | [b] Dipartimento di Scienze, Università “D'Annunzio” di Chieti-Pescara, Viale Pindaro 87, 65127 Pescara, Italy. E-mail: bista@sci.unich.it | [c] Advanced Engineering and Science Division, ITT Industries Inc., Alexandria, VA 22303, USA. E-mail: iliano@itd.nrl.navy.mil | [d] Istituto di Scienza e Tecnologie dell'Informazione – CNR, Via G. Moruzzi 1, I-56100 Pisa, Italy. E-mail: gabriele.lenzini@isti.cnr.it | [e] Department of Computer Science, University of Twente, 7500 AE Enschede, The Netherlands. E-mail: lenzinig@cs.utwente.nl
Abstract: When formalizing security protocols, different specification languages support very different reasoning methodologies, whose results are not directly or easily comparable. Therefore, establishing clear mappings among different frameworks is highly desirable, as it permits various methodologies to cooperate by interpreting theoretical and practical results of one system into another. In this paper, we examine the relationship between two general verification frameworks: multiset rewriting (MSR) and a process algebra (PA) inspired to CCS and the π-calculus. Although defining a simple and general bijection between MSR and PA appears difficult, we show that the sublanguages needed to specify cryptographic protocols admit an effective translation that is not only trace-preserving, but also induces a correspondence relation between the two languages. In particular, the correspondence sketched in this paper permits transferring several important trace-based properties such as secrecy and many forms of authentication.
DOI: 10.3233/JCS-2005-13102
Journal: Journal of Computer Security, vol. 13, no. 1, pp. 3-47, 2005
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl