O'Reilly logo

The Modelling and Analysis of Security Protocols: the CSP Approach by S. A. Schneider, P. Y.A. Ryan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

0.2. Security properties

Here we give an intuitive description of a number of important properties or services that security protocols may be required to provide. Typically, of course, a protocol will only be expected to provide a subset of these, depending on the application.

The meanings of these terms are frequently taken as obvious and widely understood. One typically finds that when pressed people find it remarkable difficult to make precise their understanding. Furthermore it often turns out that these supposedly widely understood terms are given different interpretations, sometimes within a single document or design. It is for these reasons that it is so essential to give precise, formal meanings. It is not sufficient, for example, to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required