{"title":"寻找解决方案:工程权衡和可证明安全协议的发展","authors":"John A. Clark, J. Jacob","doi":"10.1109/SECPRI.2000.848447","DOIUrl":null,"url":null,"abstract":"Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. The paper provides an early framework for handling such aspects in a uniform way based on combinatorial optimisation techniques. BAN logic is viewed as both a specification and proof system and as a \"protocol programming language\". The paper shows how evolutionary search in the form of genetic algorithms can be utilised to \"grow\" correct and efficient BAN protocols and shows how goals and assumptions can co-evolve, effectively engaging in \"specification synthesis\".","PeriodicalId":373624,"journal":{"name":"Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2000-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"127","resultStr":"{\"title\":\"Searching for a solution: engineering tradeoffs and the evolution of provably secure protocols\",\"authors\":\"John A. Clark, J. Jacob\",\"doi\":\"10.1109/SECPRI.2000.848447\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. The paper provides an early framework for handling such aspects in a uniform way based on combinatorial optimisation techniques. BAN logic is viewed as both a specification and proof system and as a \\\"protocol programming language\\\". The paper shows how evolutionary search in the form of genetic algorithms can be utilised to \\\"grow\\\" correct and efficient BAN protocols and shows how goals and assumptions can co-evolve, effectively engaging in \\\"specification synthesis\\\".\",\"PeriodicalId\":373624,\"journal\":{\"name\":\"Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2000-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"127\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECPRI.2000.848447\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECPRI.2000.848447","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Searching for a solution: engineering tradeoffs and the evolution of provably secure protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. The paper provides an early framework for handling such aspects in a uniform way based on combinatorial optimisation techniques. BAN logic is viewed as both a specification and proof system and as a "protocol programming language". The paper shows how evolutionary search in the form of genetic algorithms can be utilised to "grow" correct and efficient BAN protocols and shows how goals and assumptions can co-evolve, effectively engaging in "specification synthesis".