O'Reilly logo

The Modelling and Analysis of Security Protocols: the CSP Approach by S. A. Schneider, P. Y.A. Ryan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

2.4. Putting the network together

We now have a good idea of how reliable agents, the server, and even the intruder operate. In this final section of the chapter we will see how these are all put together into a network that can be used to test the resilience of the protocol.

You might expect to see a network consisting of many reliable agents, together with a server and the intruder. After all, the fact that Anne has run the protocol with other people first may well have a bearing on whether the run she starts with Bob is secure. However, the fact that our intruder is designed to be able to act like other agents mean that Carol, Duncan etc. do not actually have to be present as processes in our network in order for Anne to have done everything ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required