Computer Science – Cryptography and Security
Scientific paper
2012-04-02
Computer Science
Cryptography and Security
16 pages
Scientific paper
Guttman presented a model-theoretic approach to establishing security goals in the context of Strand Space theory. In his approach, a run of the Cryptographic Protocol Shapes Analyzer (CPSA) produces models that determine if a goal is satisfied. This paper presents a method for extracting a sentence that completely characterizes a run of CPSA. Logical deduction can then be used to determine if a goal is satisfied. This method has been implemented and is available to all.
No associations
LandOfFree
Deducing Security Goals From Shape Analysis Sentences does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Deducing Security Goals From Shape Analysis Sentences, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Deducing Security Goals From Shape Analysis Sentences will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-510422