• Complain

Joshua D. Guttman - Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows

Here you can read online Joshua D. Guttman - Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2019, publisher: Springer, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Joshua D. Guttman Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows

Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019.Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributions authored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.

Joshua D. Guttman: author's other books


Who wrote Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows? Find out the surname, the name of the author of the book and a list of all author's works by series.

Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Volume 11565 Lecture Notes in Computer Science Security and Cryptology - photo 1
Volume 11565
Lecture Notes in Computer Science Security and Cryptology
Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zurich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology Madras, Chennai, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA

Commenced Publication in 1973

Founding and Former Series Editors:

Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

More information about this series at http://www.springer.com/series/7410

Editors
Joshua D. Guttman , Carl E. Landwehr , Jos Meseguer and Dusko Pavlovic
Foundations of Security, Protocols, and Equational Reasoning Essays Dedicated to Catherine A. Meadows
Editors Joshua D Guttman Worcester Polytechnic Institute Worcester MA USA - photo 2
Editors
Joshua D. Guttman
Worcester Polytechnic Institute, Worcester, MA, USA
Carl E. Landwehr
George Washington University, Washington, DC, USA
Jos Meseguer
University of Illinois, Urbana, IL, USA
Dusko Pavlovic
University of Hawaii, Honolulu, HI, USA
ISSN 0302-9743 e-ISSN 1611-3349
Lecture Notes in Computer Science Security and Cryptology
ISBN 978-3-030-19051-4 e-ISBN 978-3-030-19052-1
https://doi.org/10.1007/978-3-030-19052-1
Springer Nature Switzerland AG 2019
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Cover illustration: Composite Privacy Protocol: Social Networking (SNet), p. 184

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Catherine A Meadows Preface This volume contains the papers presented at the - photo 3

Catherine A. Meadows

Preface

This volume contains the papers presented at the Catherine Meadows Festschrift Symposium held during May 2223, 2019, in Fredericksburg, Virginia.

Dr. Catherine A. Meadows, Head of the Formal Methods Group at the US Naval Research Laboratory (NRL) in Washington, D.C., has beensince the very inception of the fielda key leading researcher in formal specification and verification of cryptographic protocols. Her research ideas continue to have immense influence in shaping and advancing it.

The pervasiveness of cryptographic protocols in a massively interconnected world makes their security a direct concern, not just for governments and businesses, but also for the lives of billions of people worldwide. Formal approaches to cryptographic protocol verification are important, since even rigorous review and testing of these protocols has repeatedly failed to reveal significant vulnerabilities. The key technical point is that, even under the optimistic assumption that the cryptographic primitives used by a communication protocol cannot be broken, the protocol itself can be broken. That is, a malicious attacker can still sometimes obtain the secret information sent by an honest user without violating the protocols specification. This subversion is typically achieved by a so-called man-in-the-middle attack. Since communicationfor example, wireless or Internet communicationcan often be intercepted, an attacker can listen to various communications and maliciously participate in them, impersonating various participants at various times. In this way, the attacker can obtain correctly encrypted pieces of information, combine and use them in clever ways, and reveal protected information or obtain unauthorized capabilities. Well-tested protocols have fallen victim to subtle attacks after years of practical use, dramatically demonstrating that testing by itself is not a reliable method to ensure security. Some of Dr. Meadowss most important contributions have been precisely in the development of formal specification and verification methods and tools that can uncover such subtle attacks by a systematic formal analysis that exhaustively considers all the possible malicious actions of an attacker.

This kind of formal verification is quite challenging for at least three reasons: (1) the number of actions an attacker can perform is unbounded; (2) the number of protocol sessions an attacker can participate in to obtain and combine information from various users to mount an attack is likewise unbounded; and (3) the algebraic properties of the cryptographic functions employed by the protocol can also be used by an intruder to mount even more subtle attacks. What is challenging about issues (1)(3) is that they make it difficult to automatically verify protocols by standard model checking methods, since standard model checkers assume a finite set of reachable states, which is ruled out by both (1) and (2).

Dr. Meadows has been a pioneer in developing symbolic formal verification methods and tools that are automatic and overcome the above difficulties. Her methods can be described as a novel form of symbolic model checking of infinite-state systems that exploits the specific properties of cryptographic protocols. By using a symbolic expression to stand for a typically infinite set of concrete protocol states, both difficulties (1) and (2) can be overcome. And by reasoning symbolically about the algebraic properties of the protocols cryptographic functions using equational unification and narrowing methods, difficulty (3) can likewise be overcome. In the 1990s, Dr. Meadows first embodied these symbolic model checking techniques in her NRL Protocol Analyzer, a tool and methodology that has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. Although protocol security is an undecidable problem, by using very powerful state reduction techniques based on grammars, the NRL Protocol Analyzer was able in a good number of cases to terminate its exhaustive symbolic analysis of a given protocol security property with either an actual attack or an absence of attacks that, by the exhaustive nature of the analysis, proved the desired property.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows»

Look at similar books to Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows»

Discussion, reviews of the book Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.