Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi

Bounded Memory Protocols and Progressing Collaborative Systems (CROSBI ID 601368)

Prilog sa skupa u zborniku | izvorni znanstveni rad | međunarodna recenzija

Kanovich, Max ; Ban Kirigin, Tajana ; Nigam, Vivek ; Scedrov, Andre Bounded Memory Protocols and Progressing Collaborative Systems // Lecture Notes in Computer Science, Volume 8134 / Crampton, Jason ; Jajodia, Sushil ; Mayes, Keith (ur.). Springer, 2013. str. 309-326 doi: 10.1007/978-3-642-40203-6_18

Podaci o odgovornosti

Kanovich, Max ; Ban Kirigin, Tajana ; Nigam, Vivek ; Scedrov, Andre

engleski

Bounded Memory Protocols and Progressing Collaborative Systems

It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, sending, and composing messages, he can remember as much information as he needs. That is, his memory is unbounded. We recently proposed a weaker Dolev-Yao like adversary, which also acts as the network, but whose memory is bounded. We showed that this Bounded Memory Dolev-Yao adversary, when given enough memory, can carry out many existing protocol anomalies. In particular, the known anomalies arise for bounded memory protocols, where there is only a bounded number of concurrent sessions and the honest participants of the protocol cannot generate an unbounded number of facts nor an unbounded number of nonces. This led us to the question of whether it is possible to infer an upper-bound on the memory required by the Dolev-Yao adversary to carry out an anomaly from the memory restrictions of the bounded protocol. This paper answers this question negatively. The second contribution of this paper is the formalization of Progressing Collaborative Systems that may create fresh values, such as nonces. We also prove the NP-completeness of the reachability problem for Progressing Collaborative Systems that may create fresh values.

Collaborative systems ; Computational complexity ; Protocol security

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o prilogu

309-326.

2013.

objavljeno

10.1007/978-3-642-40203-6_18

Podaci o matičnoj publikaciji

Lecture Notes in Computer Science, Volume 8134

Crampton, Jason ; Jajodia, Sushil ; Mayes, Keith

Springer

978-3-642-40202-9

Podaci o skupu

European Symposium on Research in Computer Security (ESORICS) 2013

predavanje

12.09.2013-13.09.2013

Egham, Ujedinjeno Kraljevstvo

Povezanost rada

Matematika, Računarstvo

Poveznice
Indeksiranost