On the formal specification and verification of a multiparty session protocol
- 1 January 1990
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 216-233
- https://doi.org/10.1109/risp.1990.63853
Abstract
The formal specification and verification of the multiparty session protocol discussed by the authors previously (1988) are presented. The notion of intruder processes is introduced to model intruder actions and countermeasures of the trusted computing bases. It is argued that multilevel network security can be achieved and verified formally independent of the specific transport-layer protocols even in the presence of intruders through the use of (1) a multilevel secure session protocol and (2) a key-distribution protocol which helps establish message confidentiality and integrity across an untrusted network. Both the formal security-policy model and the formal top-level specification (FTLS) of the multiparty session protocol are written in Ina Jo. The inference rules of the logic of authentication are incorporated in Ina Jo transforms to demonstrate the correctness of the key-distribution protocol. Two detailed examples of formal proofs are included.Keywords
This publication has 8 references indexed in Scilit:
- A model for secure distributed computations in a heterogeneous environmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Multiparty interactions for interprocess communication and synchronizationIEEE Transactions on Software Engineering, 1989
- Controls for Interorganization NetworksIEEE Transactions on Software Engineering, 1987
- Covert Channels in LAN'sIEEE Transactions on Software Engineering, 1987
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976