Loading [MathJax]/extensions/MathZoom.js
Satisfiability of general intruder constraints with a set constructor | IEEE Conference Publication | IEEE Xplore

Satisfiability of general intruder constraints with a set constructor


Abstract:

Many decision problems on security protocols can be reduced to solving so-called intruder constraints in Dolev Yao model. Most constraint solving procedures for protocol ...Show More

Abstract:

Many decision problems on security protocols can be reduced to solving so-called intruder constraints in Dolev Yao model. Most constraint solving procedures for protocol security rely on two properties of constraint systems called monotonicity and variable-origination. In this work we relax these restrictions by giving an NP decision procedure for solving general intruder constraints (that do not have these properties). Our result extends a first work by L. Mazaré in several directions: we allow non-atomic keys, and an associative, commutative and idempotent symbol (for modeling sets). We also give several new applications of the result.
Date of Conference: 10-13 October 2010
Date Added to IEEE Xplore: 10 May 2011
ISBN Information:

ISSN Information:

Conference Location: Montreal, QC, Canada

Contact IEEE to Subscribe

References

References is not available for this document.