http://www.cnr.it/ontology/cnr/individuo/prodotto/ID29889
A comparison of three authentication properties (Articolo in rivista)
- Type
- Label
- A comparison of three authentication properties (Articolo in rivista) (literal)
- Anno
- 2003-01-01T00:00:00+01:00 (literal)
- Alternative label
Focardi R., Gorrieri R., Martinelli F. (2003)
A comparison of three authentication properties
in Theoretical computer science; Elsevier Science Publishers, Amsterdam (Paesi Bassi)
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- Focardi R., Gorrieri R., Martinelli F. (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
- Rivista
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroFascicolo
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#descrizioneSinteticaDelProdotto
- Authentication is a slippery security property that has been formally
defined only recently; among the recent definitions, two rather
interesting ones have been proposed for the spi-calculus and for CSP.
On the other hand, in a recent paper, we
have proved that many existing security properties can be seen
uniformly as specific instances of a general scheme based on the idea
of non-interference. The purpose of this paper is to show that, under
reasonable assumptions, spi-authentication can be recast in this
general framework as well, by showing that it is equivalent to the
non-interference property called NDC. This
allows for the comparison between such a property and the one
based on CSP, which was already recast under the general scheme.
(literal)
- Note
- Scopu (literal)
- ISI Web of Science (WOS) (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- 1 Università di Bologna, 2 Università di Venezia, 3 IIT-CNR (literal)
- Titolo
- A comparison of three authentication properties (literal)
- Abstract
- Authentication is a slippery security property that has been formally defined only recently; among the recent definitions, two rather interesting ones have been proposed for the spi-calculus by (Abadi and Gordon (in: Proc. CONCUR'97, Lecture Notes in Computer Science, Vol. 1243, Springer, Berlin, 1997, pp. 59-73; Inform. and Comput. 148(l) (1999) 1-70) and for CSP by Lowe (in: Proc. 10th Computer Security Foundation Workshop, IEEE Press, 1997, pp. 31-43). On the other hand, in a recent paper (in: Proc. World Congr. on Formal Methods (FM'99), Lecture Notes in Computer Science, Vol. 1708, Springer, Berlin, 1999, pp. 794-813), we have proved that many existing security properties can be seen uniformly as specific instances of a general scheme based on the idea of non-interference. The purpose of this paper is to show that, under reasonable assumptions, spi-authentication can be recast in this general framework as well, by showing that it is equivalent to the non-interference property called NDC of Focardi and Gorrieri (J. Comput. Security 3(l) (1994/1995) 5-33; IEEE Trans. Software Eng. 23(9) (199) 550-571). This allows for the comparison between such a property and the one based on CSP, which was already recast under the general scheme of Focardi and Martinelli (1999). (C) 2002 Elsevier Science B.V. All rights reserved. (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Editore di
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
- Insieme di parole chiave di