Intensional specifications of security protocols

  • Authors:
  • A. W. Roscoe

  • Affiliations:
  • -

  • Venue:
  • CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

It is often difficult to specify exactly what a security protocol is intended to achieve, and there are many example of attacks on protocol which have been proved to satisfy the 'wrong', or too unreal a specification. Contrary to the usual approach of attempting to capture what it is that protocol achieves in abstract terms, we propose a readily automatable style of specification which simply asserts that a node can only complete its part in a protocol run if the pattern of messages anticipated by the designer has occurred. While this intensional style of specification does not replace more abstract ones such as confidentiality, it does appear to preclude a wide range of the styles of attack that are hardest to exclude by other means.