Hostname: page-component-77c78cf97d-kmjgn Total loading time: 0.001 Render date: 2026-04-23T20:32:48.057Z Has data issue: false hasContentIssue false

Channel abstractions for network security

Published online by Cambridge University Press:  26 February 2010

MICHELE BUGLIESI
Affiliation:
Dipartimento di Informatica, Università Ca' Foscari Venezia, Via Torino 155, 30172 Venezia-Mestre, Italy Email: bugliesi@dsi.unive.it; focardi@dsi.unive.it
RICCARDO FOCARDI
Affiliation:
Dipartimento di Informatica, Università Ca' Foscari Venezia, Via Torino 155, 30172 Venezia-Mestre, Italy Email: bugliesi@dsi.unive.it; focardi@dsi.unive.it

Abstract

Process algebraic techniques for distributed systems are increasingly being targeted at identifying abstractions that are adequate for both high-level programming and specification and security analysis and verification. Drawing on our earlier work in Bugliesi and Focardi, (2008), we investigate the expressive power of a core set of security and network abstractions that provide high-level primitives for specifying the honest principals in a network, while at the same time enabling an analysis of the network-level adversarial attacks that may be mounted by an intruder.

We analyse various bisimulation equivalences for security that arise from endowing the intruder with:

  1. (i) different adversarial capabilities; and

  2. (ii) increasingly powerful control over the interaction among the distributed principals of a network.

By comparing the relative strength of the bisimulation equivalences, we obtain a direct measure of the intruder's discriminating power, and hence of the expressiveness of the corresponding intruder model.

Information

Type
Paper
Copyright
Copyright © Cambridge University Press 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Article purchase

Temporarily unavailable