The proposition is connected with the research of the security or threats referring to message decryption, user dishonesty, a non-fresh nonce, uncontrolled information jurisdiction, etc. (that means security properties - attributes), in network communication processes . Encrypted messages are usually sent in the form of protocol operations. Protocols may be mutually interleaving, creating the so called runs, and their operations can appear as mutual parallel processes. The investigation regards both particular security attributes and their compositions referring to more general factors, such as: concrete users, protocols, public keys, secrets, messages, etc. Probabilistic timed automata (PTA) and Petri nets characterize the token set and the complex form of conditions which have to be fulfilled for the realization of transition . The abovementioned situation forms a conception pertaining to the parallel strategy realized with the help of the Petri net that includes the set of security tokens (attributes) in each node.
Tensor analysis Protocol security Auditing system Probabilistic timed automata
This is a preview of subscription content, log in to check access.
Abraham, R., Marsden, J.E., Rating, T.: Manifolds, Tensor Analysis and Application, 2nd edn. Springer, New York (1988)CrossRefGoogle Scholar
Gjøsteen, K.: A new security proof for Damgård’s ElGamal. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 150–158. Springer, Heidelberg (2006)CrossRefGoogle Scholar
Kwiatkowska, M., Norman, G., Segala, R., Sproston, J.: Automatic verification of real-time systems with discrete probability distribution. Theoret. Comput. Sci. 282, 101–150 (2002)MathSciNetCrossRefMATHGoogle Scholar
Li, X., Xiong, Y., Ma, J., Wang, W.: An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2), 763–769 (2012)CrossRefGoogle Scholar
Piech, H., Grodzki, G.: Probability timed automata for investigating communication processes. Appl. Math. Comput. Sci. 25(2), 403–414 (2015)MathSciNetMATHGoogle Scholar
Piech, H., Grodzki, G.: The system conception of investigation of the communication security level in networks. In: Abramowicz, W. (ed.) BIS Workshops 2013. LNBIP, vol. 160, pp. 148–159. Springer, Heidelberg (2013)CrossRefGoogle Scholar
Tudruj, M., Masko, L.: Toward massively parallel computation based on dynamic clusters with communication on the fly. In: IS on Parallel and Distributed Computing, Lille, France, pp. 155–162 (2005)Google Scholar