Intruder deducibility constraints with negation. Decidability and application to secured service compositions

From MaRDI portal
Publication:507348

DOI10.1016/J.JSC.2016.07.008zbMATH Open1356.68012arXiv1207.4871OpenAlexW2132938106MaRDI QIDQ507348FDOQ507348


Authors: Tigran Avanesov, Yannick Chevalier, Mathieu Turuani, Michaël Rusinowitch Edit this on Wikidata


Publication date: 6 February 2017

Published in: Journal of Symbolic Computation (Search for Journal in Brave)

Abstract: The problem of finding a mediator to compose secured services has been reduced in our former work to the problem of solving deducibility constraints similar to those employed for cryptographic protocol analysis. We extend in this paper the mediator synthesis procedure by a construction for expressing that some data is not accessible to the mediator. Then we give a decision procedure for verifying that a mediator satisfying this non-disclosure policy can be effectively synthesized. This procedure has been implemented in CL-AtSe, our protocol analysis tool. The procedure extends constraint solving for cryptographic protocol analysis in a significative way as it is able to handle negative deducibility constraints without restriction. In particular it applies to all subterm convergent theories and therefore covers several interesting theories in formal security analysis including encryption, hashing, signature and pairing.


Full work available at URL: https://arxiv.org/abs/1207.4871




Recommendations




Cites Work


Cited In (2)





This page was built for publication: Intruder deducibility constraints with negation. Decidability and application to secured service compositions

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q507348)