Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. Computer Security - ESORICS 2000
  3. Conference paper

Analysing Time Dependent Security Properties in CSP Using PVS

  • Conference paper
  • pp 222–237
  • Cite this conference paper
Computer Security - ESORICS 2000 (ESORICS 2000)
Analysing Time Dependent Security Properties in CSP Using PVS
  • Neil Evans8 &
  • Steve Schneider8 

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1895))

Included in the following conference series:

  • European Symposium on Research in Computer Security
  • 667 Accesses

  • 49 Citations

Abstract

This paper details an approach to verifying time dependent authentication properties of security protocols. We discuss the introduction of time into the Communicating Sequential Processes (CSP) protocol verification framework of [11]. The embedding of CSP in the theorem prover PVS (Prototype Verification System) is extended to incorporate event-based time, retaining the use of the existing rank function approach to verify such properties. An example analysis is demonstrated using the Wide-Mouthed Frog protocol.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

The Impact of Time Parameters on the Security Protocols Correctness

Chapter © 2018

On Some Time Aspects in Security Protocols Analysis

Chapter © 2018

A UTP semantics for communicating processes with shared variables and its formal encoding in PVS

Article 25 April 2018

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Formal Languages and Automata Theory
  • Formal Logic
  • Principles and Models of Security
  • Security Services
  • Security Science and Technology
  • Computer Science Logic and Foundations of Programming
  • Formal Verification Techniques for Software Systems

References

  1. Bella, G., Paulson, L.C.: Using Isabelle to prove properties of the kerberos authentication system. In: DIMACS Workshop on Design and Formal Verification of Security Protocols (1997)

    Google Scholar 

  2. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8 (1989)

    Google Scholar 

  3. Clark, J., Jacob, J.: On the security of recent protocols. Information Processing Letters 56(3), 151–155 (1995)

    Article  MATH  Google Scholar 

  4. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2) (1983)

    Google Scholar 

  5. Dutertre, B., Schneider, S.: Embedding CSP in PVS. an application to authentication protocols. In: Gunter, E.L., Felty, A.P. (eds.) TPHOLs 1997. LNCS, vol. 1275. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  6. Lowe, G.: Casper: A compiler for the analysis of security protocols. In: Proceedings of the 10th IEEE Computer Security Foundations Workshop (1997)

    Google Scholar 

  7. Meadows, C.: Language generation and verification in the NRL Protocol Analyzer. In: Proceedings of the 10th IEEE Computer Security Foundations Workshop (1996)

    Google Scholar 

  8. Meadows, C.: Personal communication (2000)

    Google Scholar 

  9. Owre, S., Rushby, J.M., Shankar, N.: PVS: A prototype verification system. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, pp. 748–752. Springer, Heidelberg (1992)

    Google Scholar 

  10. Paulson, L.C.: Isabelle: A Generic Theorem Prover. Springer, Heidelberg (1994)

    MATH  Google Scholar 

  11. Schneider, S.A.: Verifying authentication protocols in CSP. IEEE Transactions on Software Engineering (1998)

    Google Scholar 

  12. Schneider, S.A.: Timewise refinement for communicating processes. Science of Computer Programming 28 (1997)

    Google Scholar 

  13. Schneider, S.A.: Concurrent and Real-time Systems. Wiley, Chichester (1999)

    Google Scholar 

  14. Thayer, J., Herzog, J.C., Guttman, J.D.: Strand spaces: Proving security protocols correct. Journal of Computer Security (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Computer Science, Royal Holloway, University of London,  

    Neil Evans & Steve Schneider

Authors
  1. Neil Evans
    View author publications

    Search author on:PubMed Google Scholar

  2. Steve Schneider
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. TELECOM Bretagne, 2 rue de la châtaigneraie, 35512, Cesson Sévigné Cedex, France

    Frédéric Cuppens

  2. LAAS-CNRS,  

    Yves Deswarte

  3. Institute for Security in Distributed Applications, Hamburg University of Technology, 21071, Hamburg, Germany

    Dieter Gollmann

  4. Zurich Research Laboratory, IBM Research, Säumerstrasse 4, CH-8803, Rüschlikon, Switzerland

    Michael Waidner

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Evans, N., Schneider, S. (2000). Analysing Time Dependent Security Properties in CSP Using PVS. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds) Computer Security - ESORICS 2000. ESORICS 2000. Lecture Notes in Computer Science, vol 1895. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10722599_14

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/10722599_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41031-7

  • Online ISBN: 978-3-540-45299-7

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Authentication Protocol Verification
  • Automated Theorem Proving
  • Timed Behaviour
  • CSP
  • PVS

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Footer Navigation

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover

Corporate Navigation

  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

162.0.217.198

Not affiliated

Springer Nature

© 2026 Springer Nature