Stateful protocol composition in Isabelle/HOL

AV Hess, SA Mödersheim, AD Brucker - ACM Transactions on Privacy …, 2023 - dl.acm.org
Communication networks like the Internet form a large distributed system where a huge
number of components run in parallel, such as security protocols and distributed web …

Stateful protocol composition

AV Hess, SA Mödersheim, AD Brucker - European Symposium on …, 2018 - Springer
We prove a parallel compositionality result for protocols with a shared mutable state, ie,
stateful protocols. For protocols satisfying certain compositionality conditions our result …

Secure composition of PKIs with public key protocols

V Cheval, V Cortier, B Warinschi - 2017 IEEE 30th Computer …, 2017 - ieeexplore.ieee.org
We use symbolic formal models to study the composition of public key-based protocols with
public key infrastructures (PKIs). We put forth a minimal set of requirements which a PKI …

Typing and Compositionality for Stateful Security Protocols

AV Hess - 2019 - orbit.dtu.dk
Typing and Compositionality for Stateful Security Protocols — Welcome to DTU Research
Database Skip to main navigation Skip to search Skip to main content Welcome to DTU …

[PDF][PDF] Vertical Composition and Sound Payload Abstraction for Stateful Protocols (Extended Version)

S Gondron, S Mödersheim - Tech. rep, 2021 - imm.dtu.dk
This paper deals with a problem that arises in vertical composition of protocols, ie, when a
channel protocol is used to encrypt and transport arbitrary data from an application protocol …

Stateful Protocol Composition-Extended Version

AV Hess, SA Mödersheim, AD Brucker - 2018 - orbit.dtu.dk
We prove a parallel compositionality result for protocols with a shared mutable state, ie,
stateful protocols. For protocols satisfying certain compositionality conditions our result …

Modular verification of sequential composition for private channels in Maude-NPA

F Yang, S Escobar, C Meadows, J Meseguer - International Workshop on …, 2018 - Springer
This paper gives a modular verification methodology in which, given parametric
specifications of a key establishment protocol P and a protocol Q providing private channel …

Vertical Composition of Distributed Systems

SPC Gondron - 2021 - orbit.dtu.dk
Ensuring security is a fundamental problem in modern distributed systems. For that purpose,
system designers use security protocols, eg, to transfer confidential data or to authenticate a …

On Composability and Security of Game-based Password-Authenticated Key Exchange

M Skrobot - 2017 - orbilu.uni.lu
The main purpose of Password-Authenticated Key Exchange (PAKE) is to allow secure
authenticated communication over insecure networks between two or more parties who only …

[PDF][PDF] A Compositionality Result for Alpha-Beta Privacy

L Fernet, S Mödersheim, L Viganò - imm.dtu.dk
The security goals of a protocol are often studied with the protocol running in isolation.
However, in reality, several protocols are running in parallel or are otherwise interacting with …