Authors:
            
                    Henryk Piech
                    
                        
                    
                    ; 
                
                    Grzegorz Grodzki
                    
                        
                    
                     and
                
                    Aleksandra Ptak
                    
                        
                    
                    
                
        
        
            Affiliation:
            
                    
                        
                    
                    Czestochowa University of Technology, Poland
                
        
        
        
        
        
             Keyword(s):
            Parallel Conversion, Communication Security, Probability Time Automata.
        
        
            
                Related
                    Ontology
                    Subjects/Areas/Topics:
                
                        Application Domains
                    ; 
                        Formal Methods
                    ; 
                        Petri Nets
                    ; 
                        Simulation and Modeling
                    ; 
                        Telecommunication Systems and Networks
                    
            
        
        
            
                Abstract: 
                The proposition is connected with the research of the security or threatens referring to message decryption,
user dishonesty, non-fresh nonce, uncontrolled information jurisdiction, etc. (security attributes), in network
communication processes. Encrypted messages are usually sent in the form of protocol operations. Protocols
may be mutually interleaving, creating the so called runs, and their operations can appear as mutual parallel
processes. The investigation regards both particular security attributes and their compositions referring to more
general factors, such as: concrete users, protocols, public keys, secrets, messages, etc. The abovementioned
situation forms a conception about parallel strategy realized with the help of PTA and Petri net that includes
the set of security tokens (attributes) in each node.