8 research outputs found

    Analysis models for security protocols

    Get PDF
    In this thesis, we present five significant, orthogonal extensions to the Dolev Yao model. Each extension considers a more realistic setting, closer to the real world, thus providing a stronger security guarantee. We provide examples both from the literature and from industrial case studies to show the practical applicability of each extension

    Choreographies with Secure Boxes and Compromised Principals

    Get PDF
    We equip choreography-level session descriptions with a simple abstraction of a security infrastructure. Message components may be enclosed within (possibly nested) "boxes" annotated with the intended source and destination of those components. The boxes are to be implemented with cryptography. Strand spaces provide a semantics for these choreographies, in which some roles may be played by compromised principals. A skeleton is a partially ordered structure containing local behaviors (strands) executed by regular (non-compromised) principals. A skeleton is realized if it contains enough regular strands so that it could actually occur, in combination with any possible activity of compromised principals. It is delivery guaranteed (DG) realized if, in addition, every message transmitted to a regular participant is also delivered. We define a novel transition system on skeletons, in which the steps add regular strands. These steps solve tests, i.e. parts of the skeleton that could not occur without additional regular behavior. We prove three main results about the transition system. First, each minimal DG realized skeleton is reachable, using the transition system, from any skeleton it embeds. Second, if no step is possible from a skeleton A, then A is DG realized. Finally, if a DG realized B is accessible from A, then B is minimal. Thus, the transition system provides a systematic way to construct the possible behaviors of the choreography, in the presence of compromised principals

    Precision measurement of the structure of the CMS inner tracking system using nuclear interactions

    No full text
    The structure of the CMS inner tracking system has been studied using nuclear interactions of hadrons striking its material. Data from proton-proton collisions at a center-of-mass energy of 13 TeV recorded in 2015 at the LHC are used to reconstruct millions of secondary vertices from these nuclear interactions. Precise positions of the beam pipe and the inner tracking system elements, such as the pixel detector support tube, and barrel pixel detector inner shield and support rails, are determined using these vertices. These measurements are important for detector simulations, detector upgrades, and to identify any changes in the positions of inactive elements

    Precision measurement of the structure of the CMS inner tracking system using nuclear interactions

    No full text

    Precision measurement of the structure of the CMS inner tracking system using nuclear interactions

    No full text

    Precision measurement of the structure of the CMS inner tracking system using nuclear interactions

    No full text

    Precision measurement of the structure of the CMS inner tracking system using nuclear interactions

    No full text
    The structure of the CMS inner tracking system has been studied using nuclear interactions of hadrons striking its material. Data from proton-proton collisions at a center-of-mass energy of 13 TeV recorded in 2015 at the LHC are used to reconstruct millions of secondary vertices from these nuclear interactions. Precise positions of the beam pipe and the inner tracking system elements, such as the pixel detector support tube, and barrel pixel detector inner shield and support rails, are determined using these vertices. These measurements are important for detector simulations, detector upgrades, and to identify any changes in the positions of inactive elements
    corecore