Classification of security properties - Part II : network security (Contributo in volume (capitolo o saggio))

Type
Label
  • Classification of security properties - Part II : network security (Contributo in volume (capitolo o saggio)) (literal)
Anno
  • 2004-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1007/978-3-540-24631-2_4 (literal)
Alternative label
  • Focardi R., Gorrieri R., Martinelli F. (2004)
    Classification of security properties - Part II : network security
    Springer, Berlin (Germania) in Foundations of Security Analysis and Design II, 2004
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • Focardi R., Gorrieri R., Martinelli F. (literal)
Pagina inizio
  • 139 (literal)
Pagina fine
  • 185 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://www.scopus.com/inward/record.url?eid=2-s2.0-35048815468&partnerID=40&md5=5a2e9ba67e208172e13eb4bb57566176 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#titoloVolume
  • Foundations of Security Analysis and Design II (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
  • 2946 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#volumeInCollana
  • 2946 (literal)
Rivista
Note
  • ISI Web of Science (WOS) (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • Universita' di Bologna, Universita' di Venezia, IIT-CNR (literal)
Titolo
  • Classification of security properties - Part II : network security (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
  • 978-3-540-20955-3 (literal)
Abstract
  • Many security properties of cryptographic protocols can be all formalized as specific instances of a general scheme, called Generalized Non Deducibility on Composition (GNDC). This scheme derives from the NDC property we proposed a few years ago for studying information flow in computer systems. The theory is formulated for CryptoSPA, a process algebra we introduced for the specification of cryptographic protocols. One of the advantages of our unifying GNDC-based theory is that that formal comparison among security properties become easier, being them all instances of a unique general property. Moreover, the full generality of the approach has helped us in finding a few undocumented attacks on cryptographic protocols. (literal)
Editore
Prodotto di
Autore CNR

Incoming links:


Prodotto
Autore CNR di
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
Editore di
data.CNR.it