Quick Index
Formal Methods (Models)
.
Plan for Today
.
Goals for Today
.
Taxonomy of Approaches
.
Dolev - Yao Overview
.
Public Key Encryption Review
.
Example 1
.
Breaking Example 1
.
Example 2 (variation of Needham -Schroeder)
.
Example 3: Extra encryption is not always a good idea.
.
Breaking Example 3
.
Summary of Dolev - Yao Results
.
Cascade Protocols
.
Example
.
Definition of Secure (Cascade Protocol)
.
Example 1 Again
.
Name-Stamp Protocols
.
Restriction
.
Definition of Secure (Name-Stamp Protocol)
.
Example 2 again
.
Example 3 again ( normal )
.
Breaking Example 3
.
Breaking Example 3
.
Breaking Example 3 (parsed)
.
Abadi -Tuttle Overview
.
Model of Computation
.
Runs
.
State Variables
.
Set of Actions Per Principal
.
Auxiliary State Information
.
Syntactic Restrictions on Runs
.
Semantics to Logic
.
Semantics (I)
.
Semantics (II)
.
Semantics (III)
.
Possible Worlds Semantics
.
Knowledge vs . Belief
.
Knowledge vs . Belief
.
Possible Worlds Semantics For Belief Logics
.
Semantics (IV)
.
Other Models
.
Other Models ( cont'd )
.
Heather L. Marko
Modified: December 1997