Design and Validation of Extended CSP Model

Article Preview

Abstract:

CSP method is very effective for analyzing security protocol, find security attack. But because of the limitation of limited resources, only limited instance verification can be completed. To make up for the inadequacy of CSP protocol model, the CSP mode lis extended to solve the problem of limited detecting in this paper. And then it is proved that the correctness of the extended model based on the related definitions and propositions by using the method of theoretical proof, from several aspects, such as data type of the model, process of trusted agent, process of intruder, process of manager.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1544-1550

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A.W. Roscoe: Proving security protocols with model checkers by data independence techniques. In 11th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press (1998).

DOI: 10.1109/csfw.1998.683158

Google Scholar

[2] A. Aldini,M. Bernardo and F. Corradini: A Process Algebraic Approach to Software Architecure Design. Springer(2010).

Google Scholar

[3] J. Zhao: Automatic Testing Method of Modbus Protocol Consistance, Modern Electronic Technology(2011).

Google Scholar

[4] R .S. Lazić: A semantic study of data-independence with applications to the mechanical verification of concurrent systems,D. Phil. Thesis, University of Oxford(1999).

Google Scholar

[5] R. Milner: The Space and Motion of Communicating Agents. Cambridge University Press (2009).

Google Scholar