Safe equivalences for Security properties

Mario S. Alvim, Miguel E. Andres, Catuscia Palamidessi, Peter van Rossum

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In the field of Security, process equivalences have been used to characterize various information-hiding properties (for instance secrecy, anonymity and non-interference) based on the principle that a protocol P with a variable x satisfies such property if and only if, for every pair of secrets s1 and s2, P[s1/x] is equivalent to P[s2/x]. We argue that, in the presence of nondeterminism, the above principle relies on the assumption that the scheduler "works for the benefit of the protocol", and this is usually not a safe assumption. Non-safe equivalences, in this sense, include complete-trace equivalence and bisimulation. We present a formalism in which we can specify admissible schedulers and, correspondingly, safe versions of these equivalences. We prove that safe bisimulation is still a congruence. Finally, we show that safe equivalences can be used to establish information-hiding properties.

Original languageEnglish
Title of host publicationTheoretical Computer Science - 6th IFIP TC 1/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010, Proceedings
PublisherSpringer New York LLC
Pages55-70
Number of pages16
ISBN (Print)3642152392, 9783642152399
DOIs
Publication statusPublished - 1 Jan 2010
Event6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science, TCS 2010, Held as Part of 21st IFIP World Computer Congress, WCC 2010 - Brisbane, QLD, Australia
Duration: 20 Sept 201023 Sept 2010

Publication series

NameIFIP Advances in Information and Communication Technology
Volume323 AICT
ISSN (Print)1868-4238

Conference

Conference6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science, TCS 2010, Held as Part of 21st IFIP World Computer Congress, WCC 2010
Country/TerritoryAustralia
CityBrisbane, QLD
Period20/09/1023/09/10

Fingerprint

Dive into the research topics of 'Safe equivalences for Security properties'. Together they form a unique fingerprint.

Cite this