Joshua Guttman: Pioneering Strand Spaces

2021 ◽  
pp. 348-354
Author(s):  
Sylvan Pinsky
Keyword(s):  
2011 ◽  
Vol 19 (5) ◽  
pp. 975-1025 ◽  
Author(s):  
Allaa Kamil ◽  
Gavin Lowe
Keyword(s):  

Author(s):  
F.J. Thayer Fabrega ◽  
J.C. Herzog ◽  
J.D. Guttman
Keyword(s):  

2020 ◽  
Vol 9 (1) ◽  
pp. 16 ◽  
Author(s):  
Ghaith Khalil ◽  
Robin Doss ◽  
Morshed Chowdhury

Counterfeiting and theft have always been problems that incur high costs and result in considerable losses for international markets. In this research paper, we address the issue of counterfeiting while using radio frequency identification RFID technology in retail systems or other industries by presenting a new anti-counterfeiting and anti-theft system for the retail market. This system addresses the two abovementioned issues and provides a solution that can save retail systems millions of dollars yearly. The proposed system achieves the objective of preventing or minimising the counterfeiting and theft of tagged products. At the same time, it provides a strong indication of suspiciously sold or obtained items. Furthermore, we conducted a security analysis to prove the correctness of our protocol on the basis of the strand spaces.


2005 ◽  
Vol 13 (6) ◽  
pp. 637-663 ◽  
Author(s):  
Carlos Caleiro ◽  
Luca Viganò ◽  
David Basin

2002 ◽  
Vol 9 (5) ◽  
Author(s):  
Federico Crazzolara ◽  
Glynn Winskel

The strand space model for the analysis of security protocols is known to have some limitations in the patterns of nondeterminism it allows and in the ways in which strand spaces can be composed. Its successful application to a broad range of security protocols may therefore seem surprising. This paper gives a formal explanation of the wide applicability of strand spaces. We start with an extension of strand spaces which permits several operations to be defined in a compositional way, forming a process language for building up strand spaces. We then show, under reasonable conditions how to reduce the extended strand spaces to ones of a traditional kind. For security protocols we are mainly interested in their safety properties. This suggests a strand-space equivalence: two strand spaces are equivalent if and only if they have essentially the same sets of bundles. However this equivalence is not a congruence with respect to the strand-space operations. By extending the notion of bundle we show how to define the strand-space operations directly on ``bundle spaces''. This leads to a characterisation of the largest congruence within the strand-space equivalence. Finally, we relate strand spaces to event structures, a well known model for concurrency.


Sign in / Sign up

Export Citation Format

Share Document