Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability

被引:0
作者
Pelozo, Silvia S. [1 ]
D'Argenio, Pedro R. [1 ]
机构
[1] Univ Nacl Cordoba, FaMAF, CONICET, RA-5000 Cordoba, Argentina
来源
TRUSTWORTHY GLOBAL COMPUTING, TGC 2013 | 2013年 / 8358卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a framework to analyze security properties in distributed protocols. The framework is constructed on top of the so called (strongly) distributed schedulers where secrecy is also considered. Secrecy is presented as an equivalence class on actions to those components that do not have access to such secrets; however these actions can be distinguished by those with appropriate clearance. We also present an algorithm to solve bounded reachability analysis on this kind of models. The algorithm appropriately encodes the nondeterministic model by interpreting the decisions of the schedulers as parameters. The problem is then reduced to a polynomial optimization problem.
引用
收藏
页码:182 / 197
页数:16
相关论文
共 17 条
[1]  
Andres M., 2011, THESIS RADBOUD U NIJ
[2]   Information hiding in probabilistic concurrent systems [J].
Andres, Miguel E. ;
Palamidessi, Catuscia ;
van Rossum, Peter ;
Sokolova, Ana .
THEORETICAL COMPUTER SCIENCE, 2011, 412 (28) :3072-3089
[3]  
[Anonymous], ACM Transactions on Information and System Security (TISSEC), DOI DOI 10.1145/290163.290168
[4]  
Bhargava M, 2005, LECT NOTES COMPUT SC, V3653, P171, DOI 10.1007/11539452_16
[5]  
Bianco A., 1995, Foundations of Software Technology and Theoretical Computer Science. 15th Conference. Proceedings, P499
[6]  
Cahn G, 2010, LECT NOTES COMPUT SC, V6349, P193
[7]   Analyzing security protocols using time-bounded Task-PIOAs [J].
Canetti, Ran ;
Cheung, Ling ;
Kaynar, Dilsun ;
Liskov, Moses ;
Lynch, Nancy ;
Pereira, Olivier ;
Segala, Roberto .
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 2008, 18 (01) :111-159
[8]   Making random choices invisible to the scheduler [J].
Chatzikokolakis, Konstantinos ;
Palamidessi, Catuscia .
INFORMATION AND COMPUTATION, 2010, 208 (06) :694-715
[9]  
Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
[10]   Switched PIOA: Parallel composition via distributed scheduling [J].
Cheung, Ling ;
Lynch, Nancy ;
Segala, Roberto ;
Vaandrager, Frits .
THEORETICAL COMPUTER SCIENCE, 2006, 365 (1-2) :83-108