Security protocols are relatively small and need to be right. One can interpret these protocols as messages exchanged between agents that might be intercepted or altered by an intruder. Therefore, a security protocol can be represented as a system of parallel CSP processes that correspond to the agents and intruder …
read moreOther presentations
Axiomatizing GSOS with termination
Aceto, Bloom and Vaandrager showed for the GSOS-format how to generate sound and complete axiomatizations. We add to the GSOS-format a notion of termination and adapt the axiomatization technique for this setting. The result is twofold: successful termination and deadlock are treated separately; the resulting axiom systems are in several …
read more
Page 1 / 1