On Backward-Style Verification for Timed Anonymity of Security Protocols

被引:0
|
作者
Kawabe, Yoshinobu [1 ]
Ito, Nobuhiro [1 ]
机构
[1] Aichi Inst Technol, Dept Informat Sci, 1247 Yachigusa Yakusa Cho, Toyota, Aichi, Japan
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Trace anonymity is an extension of the formulation of anonymity by Schneider and Sidiropoulos. To prove the trace anonymity of infinite-state or unbounded systems, we have introduced proof techniques in which we find a binary relation called an anonymous simulation. There are two sorts of anonymous simulation methods a forward-style method and a backward-style method. In our previous work, we discussed a proof technique for the anonymity of real-time systems, and the approach was based on the forward-style method. In this study, we concentrate on the backward-style method, and we discuss how to prove the timed anonymity.
引用
下载
收藏
页数:5
相关论文
共 50 条
  • [31] Constraint abstraction in verification of security protocols
    Zhou, Ti
    Li, Zhoujun
    Li, Mengjun
    Chen, Huowang
    FRONTIERS IN ALGORITHMICS, 2008, 5059 : 252 - +
  • [32] External consistency and the verification of security protocols
    Foley, SN
    SECURITY PROTOCOLS, 1999, 1550 : 24 - 35
  • [33] A tool for lazy verification of security protocols
    Chevalier, Y
    Vigneron, L
    16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 373 - 376
  • [34] A Verification Framework for Stateful Security Protocols
    Li, Li
    Dong, Naipeng
    Pang, Jun
    Sun, Jun
    Bai, Guangdong
    Liu, Yang
    Dong, Jin Song
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2017, 2017, 10610 : 262 - 280
  • [35] Using Interpolation for the Verification of Security Protocols
    Rocchetto, Marco
    Vigano, Luca
    Volpe, Marco
    Vedove, Giacomo Dalle
    SECURITY AND TRUST MANAGEMENT, STM 2013, 2013, 8203 : 99 - 114
  • [36] A framework for compositional verification of security protocols
    Andova, Suzana
    Cremers, Cas
    Gjosteen, Kristian
    Mauw, Sjouke
    Mjolsnes, Stig F.
    Radomirovic, Saga
    INFORMATION AND COMPUTATION, 2008, 206 (2-4) : 425 - 459
  • [37] TIMED MODELS OF SECURITY PROTOCOLS INCLUDING DELAYS IN THE NETWORK
    Szymoniak, Sabina
    Kurkowski, Miroslaw
    Piatkowski, Jacek
    JOURNAL OF APPLIED MATHEMATICS AND COMPUTATIONAL MECHANICS, 2015, 14 (03) : 127 - 139
  • [38] On computer-assisted verification of timed anonymity of multi-agent systems
    Kawabe, Yoshinobu
    Ito, Nobuhiro
    2016 4TH INTL CONF ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY/3RD INTL CONF ON COMPUTATIONAL SCIENCE/INTELLIGENCE AND APPLIED INFORMATICS/1ST INTL CONF ON BIG DATA, CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (ACIT-CSII-BCD), 2016, : 307 - 312
  • [39] Formal analysis of some timed security properties in wireless protocols
    Gorrieri, R
    Martinelli, F
    Petrocchi, M
    Vaccarelli, A
    FORMAL METHODS FOR OPEN OBJECT-BASED DISTRIBUTED SYSTEMS, PROCEEDINGS, 2003, 2884 : 139 - 154
  • [40] Formal Verification of Security Protocols: ProVerif and Extensions
    Yao, Jiangyuan
    Xu, Chunxiang
    Li, Deshun
    Lin, Shengjun
    Cao, Xingcan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 500 - 512