Abstract.
We report on experiences gained from the application of data refinement techniques to the development of examples of secure communications systems. The aim was to the carry the development from initial abstract specification of security services through to detailed designs. The development approach was based on action systems, with B and CSP being used as concrete notations. The security services in question are a confidential communications service and an authenticated transaction service. Refinements include explicit representations of intruder behaviour. The paper makes several interrelated contributions. It demonstrates the feasibility of applying a refinement approach to this type of problem, including an effective way of combining B and CSP in refinements. It introduces a more systematic approach to the development of abstraction invariants and refinement checking. Finally, it illustrates the limitation, when modelling security protocols, of a formalism that does not deal with probability.
Similar content being viewed by others
Author information
Authors and Affiliations
Additional information
Received October 1998 / Accepted in revised form February 2002
Correspondence and offprint requests to: Michael Butler, Department of Electronics and Computer Science, University of Southampton, Highfield, Southampton SO17 1BJ, UK. Email: M.J.Butler@ecs.soton.ac.ukau
Rights and permissions
About this article
Cite this article
Butler, M. On the Use of Data Refinement in the Development of Secure Communications Systems. Form Aspects Comput 14, 2–34 (2002). https://doi.org/10.1007/s001650200025
Issue Date:
DOI: https://doi.org/10.1007/s001650200025