47 research outputs found

    Falsity Conditions for IF-Sentences

    Get PDF
    We give a procedure to obtain falsity conditions for IF-sentences, using Skolemization. The expressive power of an IF-sentence can then be strongly captured by a pair of Σ11-sentences. A result from [Burgess 2003] shows that, conversely, any pair of incompatible Σ11-sentences corresponds with an IF-sentence.In the second part, we reflect on the influence of the order of the steps (inside-out versus outside-in) in the Skolemization procedures for IF-logic. We also reflect on the nature of game theoretical negation

    Security-by-experiment: lessons from responsible deployment in cyberspace

    Get PDF
    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safetyrelated, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, dversarial agents (attackers)may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies

    Dynamic epistemic verification of security protocols: framework and case study

    Get PDF
    We propose a dynamic epistemic framework for the verification of security protocols. First, we introduce a dynamic epistemic logic equipped with iteration and cryptographic supplements in which we can formalize and check (epistemic) requirements of security protocols. On top of this, we give a general guide how to go from a protocol specification to its representation in our framework. We demonstrate this by checking requirements of a simplified version of a protocol for confidential message comparison

    Refinement of Kripke Models for Dynamics

    Get PDF
    We propose a property-preserving refinement/abstraction theory for Kripke Modal Labelled Transition Systems incorporating not only state mapping but also label and proposition lumping, in order to have a compact but informative abstraction. We develop a 3-valued version of Public Announcement Logic (PAL) which has a dynamic operator that changes the model in the spirit of public broadcasting. We prove that the refinement relation on static models assures us to safely reason about any dynamic properties in terms of PAL-formulas on the abstraction of a model. The theory is in particular interesting and applicable for an epistemic setting as the example of the Muddy Children puzzle shows, especially in the view of the growing interest for epistemic modelling and (automatic) verification of communication protocols

    What is Protocol Analysis?

    Get PDF

    Falsity conditions for IF-sentences

    No full text
    We give a procedure to obtain falsity conditions for IF-sentences, using Skolemization. The expressive power of an IF-sentence can then be strongly captured by a pair of ??11 -sentences. A result from [Burgess 2003] shows that, conversely, any pair of incompatible ??11 -sentences corresponds with an IF-sentence. In the second part, we reflect on the influence of the order of the steps (inside-out versus outside-in) in the Skolemization procedures for IF-logic. We also reflect on the nature of game theoretical negation
    corecore