On Backward-Style Verification for Timed Anonymity of Security Protocols

被引:0
|
作者
Kawabe, Yoshinobu [1 ]
Ito, Nobuhiro [1 ]
机构
[1] Aichi Inst Technol, Dept Informat Sci, 1247 Yachigusa Yakusa Cho, Toyota, Aichi, Japan
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Trace anonymity is an extension of the formulation of anonymity by Schneider and Sidiropoulos. To prove the trace anonymity of infinite-state or unbounded systems, we have introduced proof techniques in which we find a binary relation called an anonymous simulation. There are two sorts of anonymous simulation methods a forward-style method and a backward-style method. In our previous work, we discussed a proof technique for the anonymity of real-time systems, and the approach was based on the forward-style method. In this study, we concentrate on the backward-style method, and we discuss how to prove the timed anonymity.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] On backward-style anonymity verification
    Kawabe, Yoshinobu
    Mano, Ken
    Sakurada, Hideki
    Tsukada, Yasuyuki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2597 - 2606
  • [2] Using Backward Induction Techniques in (Timed) Security Protocols Verification
    Kurkowski, Miroslaw
    Siedlecka-Lamch, Olga
    Dudek, Pawel
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 265 - 276
  • [3] A Formal Specification and Verification Framework for Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Sun, Meng
    Dong, Jin-Song
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (08) : 725 - 746
  • [4] Automated Verification of Timed Security Protocols with Clock Drift
    Li, Li
    Sun, Jun
    Dong, Jin Song
    [J]. FM 2016: FORMAL METHODS, 2016, 9995 : 513 - 530
  • [5] Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols
    Zbrzezny, Agnieszka M.
    Siedlecka-Lamch, Olga
    Szymoniak, Sabina
    Zbrzezny, Andrzej
    Kurkowski, Miroslaw
    [J]. Applied Sciences (Switzerland), 2024, 14 (22):
  • [6] Group Anonymity in Security Protocols
    Tiplea, Ferucio Laurentiu
    Varlan, Cosmin
    [J]. PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 407 - 416
  • [7] Complexity of Anonymity for Security Protocols
    Tiplea, Ferucio Laurentiu
    Vamanu, Loredana
    Varlan, Cosmin
    [J]. COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 558 - 572
  • [8] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
  • [9] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [10] Verification of Security Protocols
    Cortier, Veronique
    [J]. VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13