A decision procedure for the existence of a rank function

  • Authors:
  • James Heather;Steve Schneider

  • Affiliations:
  • Department of Computing, University of Surrey, Guildford, Surrey, GU2 7XH, UK;Department of Computing, University of Surrey, Guildford, Surrey, GU2 7XH, UK

  • Venue:
  • Journal of Computer Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Schneider's work on rank functions [IEEE TSE 24(9) (1998)] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only with a protocol running on a small network: and no help is given with the somewhat hit-and-miss process of finding the rank function that underpins the central theorem.In this paper, we develop the theory to allow for an arbitrarily large network, and give a clearly defined decision procedure by which one may either construct a rank function, proving correctness of the protocol, or show that no rank function exists.We briefly discuss the implications of the absence of a rank function, and the open question of completeness of the rank function theorem.