Skip to main content

External Consistency and the Verification of Security Protocols

Position Paper

  • Conference paper
  • First Online:
Security Protocols (Security Protocols 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1550))

Included in the following conference series:

  • 353 Accesses

Abstract

The notion of external consistency—that system state correctly reflects the real world—provides a basis for a denotational definition of integrity. We regard segregation of duties, well formed transactions, auditing, replication, MACs, and so forth, as simply implementation techniques: they define how to achieve this notion of integrity in an operational sense. Therefore, we argue that when a designer claims that a system is fault-tolerant, or that a protocol properly authenticates, or that a system is secure against fraud, then what the designer is actually claiming is that it is externally consistent. An advantage of taking this view is that it allows us to give a meaning to the ‘security’ of a system that uses a combination of these implementation techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W.R. Ashby. An Introduction to Cybernetics. Methuen, New York, 1964.

    Google Scholar 

  2. M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. Technical Report Report number 39, Digital Systems Research Center, February 1989.

    Google Scholar 

  3. D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security models. In Proceedings Symposium on Security and Privacy, pages 184–194. IEEE Computer Society Press, April 1987.

    Google Scholar 

  4. R. Focardi, A. Ghelli, and R. Gorrieri. Using noninterference for the analysis of security protocols. In Proceedings of DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997.

    Google Scholar 

  5. S.N. Foley. Evaluating system integrity. April 1998. Submitted for publication.

    Google Scholar 

  6. C.A.R. Hoare. Communicating Sequential Processes. Prentice Hall, 1985.

    Google Scholar 

  7. L.C. Paulson. The inductive approach to verifying cryptographic protocols. In Proceedings of the IEEE Computer Security Foundations Workshop, 1997.

    Google Scholar 

  8. A.W. Roscoe. Using intensional specifications of security protocols. In Proceedings of the IEEE Computer Security Foundations Workshop, 1996.

    Google Scholar 

  9. A.C. Simpson. Safety through Security. PhD thesis, Oxford University, Computing Laboratory, 1996.

    Google Scholar 

  10. J.F. Palmer S.M. McMenamin. Essential Systems Analysis. Prentice Hall, 1984.

    Google Scholar 

  11. D. Weber. Specifications for fault-tolerance. Technical Report 19-3, Odyssey Research Associates, Ithaca,NY, 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Foley, S.N. (1998). External Consistency and the Verification of Security Protocols. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds) Security Protocols. Security Protocols 1998. Lecture Notes in Computer Science, vol 1550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49135-X_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-49135-X_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65663-0

  • Online ISBN: 978-3-540-49135-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics