Analysing the combined Kerberos timed authentication protocol and frequent key renewal using CSP and rank functions.
… This paper presents an application of rank functions approach to an authentication … CSP
codes and the construction of rank functions of a new protocol proposed for improving security …
codes and the construction of rank functions of a new protocol proposed for improving security …
How to round any CSP
P Raghavendra, D Steurer - 2009 50th Annual IEEE …, 2009 - ieeexplore.ieee.org
… used in literature to approximate CSPs. Thus, irrespective of the truth of the UGC, our work
yields an efficient generic algorithm that for every CSP, … solve the resulting CSP instance by …
yields an efficient generic algorithm that for every CSP, … solve the resulting CSP instance by …
Using a PVS embedding of CSP to verify authentication protocols
B Dutertre, S Schneider - International Conference on Theorem Proving in …, 1997 - Springer
… Using a semantics embedding of CSP, we specify the general … theorems about authentication
and rank functions. We then … important aspects of the analysis: finding rank functions. …
and rank functions. We then … important aspects of the analysis: finding rank functions. …
A decision procedure for the existence of a rank function
J Heather, S Schneider - Journal of Computer Security, 2005 - journals.sagepub.com
… a rank function, or demonstrates that no rank function exists. … approach to using rank functions
with CSP for protocol analysis; … a procedure for constructing a rank function if one exists. …
with CSP for protocol analysis; … a procedure for constructing a rank function if one exists. …
Cloud-trust—A security assessment model for infrastructure as a service (IaaS) clouds
D Gonzales, JM Kaplan, E Saltzman… - … on Cloud Computing, 2015 - ieeexplore.ieee.org
… security assessment model—Cloud-Trust—that provides quantitative high level security
assessments of IaaS CCSs and CSPs… CSP sysadmins control CSP management servers using a …
assessments of IaaS CCSs and CSPs… CSP sysadmins control CSP management servers using a …
CAB: Cloud Security Assessment and Brokerage
A Hassan, YS Mahmoud, A Amro… - 2023 International …, 2023 - ieeexplore.ieee.org
… CSPs with users' specific security requirements. In this paper, we present the Cloud Assessment
… between 1 and 0, and in this analysis, it denoted a relative rank value of 0.5.[12] For the …
… between 1 and 0, and in this analysis, it denoted a relative rank value of 0.5.[12] For the …
Analysing authentication protocols using CSP and rank functions
SA Shaikh - 2022 - eprints.glos.ac.uk
… rank functions. We propose a simple heuristic for constructing candidate rank functions, …
to Heather and Schneider, for constructing rank functions. We examine relevant issues and …
to Heather and Schneider, for constructing rank functions. We examine relevant issues and …
[PDF][PDF] Oh!... Is it really you? Using rank functions to verify authentication protocols
J Heather - 2000 - openresearch.surrey.ac.uk
… , we introduce CSP, the process algebra that we shall be using to model security protocols
… Finally, Section 2.4 covers Schneider’s work on rank functions and how they may be used to …
… Finally, Section 2.4 covers Schneider’s work on rank functions and how they may be used to …
A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers
S Rizvi, J Mitchell, A Razaque, MR Rizvi… - Journal of cloud …, 2020 - Springer
… use the fuzzy logic process for CSP security assessment and to establish trust between a
CSU and CSP … to evaluate each CSP and rank them according to the security index. Suppose …
CSU and CSP … to evaluate each CSP and rank them according to the security index. Suppose …
Towards automatic verification of authentication protocols on an unbounded network
J Heather, S Schneider - … 13th IEEE Computer Security …, 2000 - ieeexplore.ieee.org
… a rank function, or demonstrates that no rank function exists. … approach to using rank functions
with CSP for protocol analysis; … a procedure for constructing a rank function if one exists. …
with CSP for protocol analysis; … a procedure for constructing a rank function if one exists. …