7.4. Authentication
Authentication can also be established using the rank function approach. We want to establish that R precedes T. This can be achieved by restricting R and showing that T cannot occur in the resulting system. This works because
Hence we simply have to show that which we can do using rank functions: simply find an appropriate rank function for which all facts in T have rank 0.
Furthermore, the restriction of R can be distributed to the various components of System. Since R will actually be a set of signal events associated with ...
Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.