Authentication: A Practical Study in Belief and Action
Date: June 1988
Publication: University of Cambridge Technical Report #138
Source 1: http://www.tark.org/proceedings/tark_mar7_88/p325-burrows.pdf
Abstract or Summary:
Questions of belief and action are essential in the analysis of protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs. Our formalism has enabled us to isolate and express these differences in a way that was not previously possible, and it has drawn attention to features of the protocols of which we were previously unaware. The reasoning about particular protocols has been mechanically verified.
This paper starts with an informal account of the problem, goes on to explain the formalism to be used, and gives examples of its application to real protocols from the literature. The final sections deal with a formal semantics of the logic and conclusions.
Do you have additional information to contribute regarding this research paper? If so, please email firstname.lastname@example.org with the details.