O'Reilly logo

The Modelling and Analysis of Security Protocols: the CSP Approach by S. A. Schneider, P. Y.A. Ryan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Modelling security protocols in CSP

Security protocols work through the interaction of a number of processes in parallel that send each other messages. CSP is therefore an obvious notation for describing both the participants in the network and the composition that puts them together. In this chapter we describe how this is done, concentrating specifically on how protocol models can be built that allow us to probe for security flaws.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required