Parallel real time investigation of communication security changes based on probabilistic timed automata

N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The proposition is connected with the research of the security or threats referring to message decryption, user dishonesty, a nonfresh nonce, uncontrolled information jurisdiction, etc. (that means security properties - attributes), in network communication processes [3]. Encrypted messages are usually sent in the form of protocol operations. Protocols may be mutually interleaving, creating the so called runs, and their operations can appear as mutual parallel processes. The investigation regards both particular security attributes and their compositions referring to more general factors, such as: Concrete users, protocols, public keys, secrets, messages, etc. Probabilistic timed automata (PTA) and Petri nets characterize the token set and the complex form of conditions which have to be fulfilled for the realization of transition [5]. The abovementioned situation forms a conception pertaining to the parallel strategy realized with the help of the Petri net that includes the set of security tokens (attributes) in each node.

Cite

CITATION STYLE

APA

Piech, H., & Grodzki, G. (2016). Parallel real time investigation of communication security changes based on probabilistic timed automata. In Lecture Notes in Business Information Processing (Vol. 255, pp. 158–168). Springer Verlag. https://doi.org/10.1007/978-3-319-39426-8_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free