Authors:
Henryk Piech
;
Grzegorz Grodzki
and
Aleksandra Ptak
Affiliation:
Czestochowa University of Technology, Poland
Keyword(s):
Parallel Conversion, Communication Security, Probability Time Automata.
Related
Ontology
Subjects/Areas/Topics:
Application Domains
;
Formal Methods
;
Petri Nets
;
Simulation and Modeling
;
Telecommunication Systems and Networks
Abstract:
The proposition is connected with the research of the security or threatens referring to message decryption,
user dishonesty, non-fresh nonce, uncontrolled information jurisdiction, etc. (security attributes), in network
communication processes. Encrypted messages are usually sent in the form of protocol operations. Protocols
may be mutually interleaving, creating the so called runs, and their operations can appear as mutual parallel
processes. The investigation regards both particular security attributes and their compositions referring to more
general factors, such as: concrete users, protocols, public keys, secrets, messages, etc. The abovementioned
situation forms a conception about parallel strategy realized with the help of PTA and Petri net that includes
the set of security tokens (attributes) in each node.