On the Use of Data Refinement in the Development of Secure Communications Systems
- 1 October 2002
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in Formal Aspects of Computing
- Vol. 14 (1) , 2-34
- https://doi.org/10.1007/s001650200025
Abstract
: We report on experiences gained from the application of data refinement techniques to the development of examples of secure communications systems. The aim was to the carry the development from initial abstract specification of security services through to detailed designs. The development approach was based on action systems, with B and CSP being used as concrete notations. The security services in question are a confidential communications service and an authenticated transaction service. Refinements include explicit representations of intruder behaviour. The paper makes several interrelated contributions. It demonstrates the feasibility of applying a refinement approach to this type of problem, including an effective way of combining B and CSP in refinements. It introduces a more systematic approach to the development of abstraction invariants and refinement checking. Finally, it illustrates the limitation, when modelling security protocols, of a formalism that does not deal with probability.Keywords
This publication has 11 references indexed in Scilit:
- csp2B: A Practical Approach to Combining CSP and BFormal Aspects of Computing, 2000
- The inductive approach to verifying cryptographic protocolsJournal of Computer Security, 1998
- Action systems for security specificationJournal of Computer Security, 1997
- The B-BookPublished by Cambridge University Press (CUP) ,1996
- Stepwise refinement of communicating systemsScience of Computer Programming, 1996
- Probabilistic predicate transformersACM Transactions on Programming Languages and Systems, 1996
- The NRL Protocol Analyzer: An OverviewThe Journal of Logic Programming, 1996
- An attack on the Needham-Schroeder public-key authentication protocolInformation Processing Letters, 1995
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987