On Backward-Style Verification for Timed Anonymity of Security Protocols

被引:0
|
作者
Kawabe, Yoshinobu [1 ]
Ito, Nobuhiro [1 ]
机构
[1] Aichi Inst Technol, Dept Informat Sci, 1247 Yachigusa Yakusa Cho, Toyota, Aichi, Japan
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Trace anonymity is an extension of the formulation of anonymity by Schneider and Sidiropoulos. To prove the trace anonymity of infinite-state or unbounded systems, we have introduced proof techniques in which we find a binary relation called an anonymous simulation. There are two sorts of anonymous simulation methods a forward-style method and a backward-style method. In our previous work, we discussed a proof technique for the anonymity of real-time systems, and the approach was based on the forward-style method. In this study, we concentrate on the backward-style method, and we discuss how to prove the timed anonymity.
引用
下载
收藏
页数:5
相关论文
共 50 条
  • [21] Verification of Privacy Timed Properties in Web Service Protocols
    Mokhtari, K.
    Benbernou, S.
    Said, M.
    Coquery, E.
    Hacid, M. S.
    Leymann, F.
    2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 2008, : 593 - +
  • [22] Automated Verification of Accountability in Security Protocols
    Kuennemann, Robert
    Esiyok, Ilkan
    Backes, Michael
    2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 397 - 413
  • [23] A Modeling and Verification Framework for Security Protocols
    Lilli, Mario
    RIGOROUS STATE-BASED METHODS, ABZ 2021, 2021, 12709 : 158 - 161
  • [24] Automatic Verification of Simulatability in Security Protocols
    Araragi, Tadashi
    Pereira, Olivier
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 275 - +
  • [25] AnBx - Security Protocols Design and Verification
    Bugliesi, Michele
    Modesti, Paolo
    AUTOMATED REASONING FOR SECURITY PROTOCOL ANALYSIS AND ISSUES IN THE THEORY OF SECURITY, 2010, 6186 : 164 - 184
  • [26] Automatic verification of correspondences for security protocols
    Blanchet, Bruno
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (04) : 363 - 434
  • [27] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [28] Challenges in the automated verification of security protocols
    Comon-Lundh, Hubert
    AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 396 - 409
  • [29] Complexity of Security Protocols Verification Tools
    Mazur, Michal
    Kurkowski, Miroslaw
    2019 IEEE 15TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS (INFORMATICS 2019), 2019, : 403 - 408
  • [30] Network's Delays in Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, ISAT 2018, PT I, 2019, 852 : 19 - 29