A calculus of mobile processes, II
Information and Computation
A lattice model of secure information flow
Communications of the ACM
Mobile values, new names, and secure communication
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Principles of Program Analysis
Principles of Program Analysis
Confidentiality Analysis of Mobile Systems
SAS '00 Proceedings of the 7th International Symposium on Static Analysis
Abstract interpretation of mobile ambients
Science of Computer Programming - Special issue on static analysis (SAS'99)
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
ISORC '07 Proceedings of the 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing
Modelling Security Properties in a Grid-based Operating System with Anti-Goals
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
On the security of public key protocols
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
Virtual Organization Support within a Grid-Wide Operating System
IEEE Internet Computing
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
Verifying a delegation protocol for grid systems
Future Generation Computer Systems
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
New directions in cryptography
IEEE Transactions on Information Theory
Hi-index | 0.00 |
This paper presents a case study in the application of formal modelling and verification techniques to a large-scale distributed operating system for Grids called XtreemOS. The process algebraic language of applied À-calculus is used to model one of the mutual authentication protocols in the XtreemOS trust model, and an associated tool called ProVerif is used to verify the data leakage and mutual authentication properties in the protocol. The results, beside enhancing the level of assurance of the protocol in a critical part of the system, contribute to better understanding of the level of detail in the protocol's specification hence enabling better implementation of the protocol.