Compositional refinement in agent-based security protocols

被引:3
作者
McIver, A. K. [1 ]
Morgan, C. C. [2 ]
机构
[1] Macquarie Univ, Dept Comp Sci, Sydney, NSW 2109, Australia
[2] Univ New S Wales, Sch Computat Sci & Engn, Sydney, NSW 2052, Australia
关键词
Refinement of security; Formalised secrecy; Hierarchical security reasoning; Compositional semantics;
D O I
10.1007/s00165-010-0164-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A truly secure protocol is one which never violates its security requirements, no matter how bizarre the circumstances, provided those circumstances are within its terms of reference. Such cast-iron guarantees, as far as they are possible, require formal, rigorous techniques: proof or model-checking. Informally, they are difficult or impossible to achieve. Our rigorous technique is refinement, until recently not much applied to security. We argue its benefits by using refinement-based program algebra to develop several security case studies. That is one of our contributions here. The soundness of the technique follows from its compositional semantics, one which we defined (elsewhere) to support a specialisation of standard refinement by enriching standard semantics with information that tracks correlations between hidden state and visible behaviour. A further contribution is to extend the basic theory of secure refinement (Morgan in Mathematics of program construction, Springer, Berlin, vol. 4014, pp. 359-378, 2006) with special features required by our case studies, namely agent-based systems with complementary security requirements, and looping programs.
引用
收藏
页码:711 / 737
页数:27
相关论文
共 34 条
[1]  
Abramsky S., 1994, Handbook of Logic in Computer Science, V3, P1
[2]  
Alur R, 2006, LECT NOTES COMPUT SC, V4052, P107
[3]  
Amtoft T, 2004, LNCS, V3148
[4]  
[Anonymous], 1976, A discipline of programming
[5]   Towards a Logical Account of Declassification [J].
Banerjee, Anindya ;
Naumann, David A. ;
Rosenberg, Stan .
PLAS'07: PROCEEDINGS OF THE 2007 ACM SIGPLAN WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY, 2007, :61-65
[6]  
Bogetoft P, 2010, SECURE MULTIPARTY CO
[7]   Refinement operators and information flow security [J].
Bossi, A ;
Focardi, R ;
Piazza, C ;
Rossi, S .
FIRST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2003, :44-53
[8]  
Cerny P, 2009, COMMUNICATION
[9]  
Coble A, 2008, PRIV ENH TE IN PRESS
[10]  
Engelhardt K, 2001, LNCS, V2250, P125