334 research outputs found

    Models for CSP with availability information

    Full text link
    We consider models of CSP based on recording what events are available as possible alternatives to the events that are actually performed. We present many different varieties of such models. For each, we give a compositional semantics, congruent to the operational semantics, and prove full abstraction and no-junk results. We compare the expressiveness of the different models.Comment: In Proceedings EXPRESS'10, arXiv:1011.601

    information kocessing Letters An attack on the Needham-Schroeder public-key authentication protocol

    Get PDF
    Abstract In this paper we present an attack upon the Needham-Schroeder public-key authentication protocol. The attack allows an intruder to impersonate another agent

    The Potential for EBV Vaccines to Prevent Multiple Sclerosis

    Get PDF
    There is increasing evidence suggesting that Epstein-Barr virus infection is a causative factor of multiple sclerosis (MS). Epstein-Barr virus (EBV) is a human herpesvirus, Human Gammaherpesvirus 4. EBV infection shows two peaks: firstly, during early childhood and, secondly during the teenage years. Approximately, 90-95% of adults have been infected with EBV and for many this will have been a subclinical event. EBV infection can be associated with significant morbidity and mortality; for example, primary infection in older children or adults is the leading cause of infectious mononucleosis (IM). A disrupted immune response either iatrogenically induced or through genetic defects can result in lymphoproliferative disease. Finally, EBV is oncogenic and is associated with several malignancies. For these reasons, vaccination to prevent the damaging aspects of EBV infection is an attractive intervention. No EBV vaccines have been licensed and the prophylactic vaccine furthest along in clinical trials contains the major virus glycoprotein gp350. In a phase 2 study, the vaccine reduced the rate of IM by 78% but did not prevent EBV infection. An EBV vaccine to prevent IM in adolescence or young adulthood is the most likely population-based vaccine strategy to be tested and adopted. National registry studies will need to be done to track the incidence of MS in EBV-vaccinated and unvaccinated people to see an effect of the vaccine on MS. Assessment of vaccine efficacy with MS being a delayed consequence of EBV infection with the average age of onset being approximately 30 years of age represents multiple challenges.</p

    A Spatial-Epistemic Logic for Reasoning about Security Protocols

    Full text link
    Reasoning about security properties involves reasoning about where the information of a system is located, and how it evolves over time. While most security analysis techniques need to cope with some notions of information locality and knowledge propagation, usually they do not provide a general language for expressing arbitrary properties involving local knowledge and knowledge transfer. Building on this observation, we introduce a framework for security protocol analysis based on dynamic spatial logic specifications. Our computational model is a variant of existing pi-calculi, while specifications are expressed in a dynamic spatial logic extended with an epistemic operator. We present the syntax and semantics of the model and logic, and discuss the expressiveness of the approach, showing it complete for passive attackers. We also prove that generic Dolev-Yao attackers may be mechanically determined for any deterministic finite protocol, and discuss how this result may be used to reason about security properties of open systems. We also present a model-checking algorithm for our logic, which has been implemented as an extension to the SLMC system.Comment: In Proceedings SecCo 2010, arXiv:1102.516

    Security Theorems via Model Theory

    Full text link
    A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas expressing authentication and non-disclosure properties of protocols have a special form. They are quantified implications for all xs . (phi implies for some ys . psi). Models (interpretations) for these formulas are *skeletons*, partially ordered structures consisting of a number of local protocol behaviors. Realized skeletons contain enough local sessions to explain all the behavior, when combined with some possible adversary behaviors. We show two results. (1) If phi is the antecedent of a security goal, then there is a skeleton A_phi such that, for every skeleton B, phi is satisfied in B iff there is a homomorphism from A_phi to B. (2) A protocol enforces for all xs . (phi implies for some ys . psi) iff every realized homomorphic image of A_phi satisfies psi. Hence, to verify a security goal, one can use the Cryptographic Protocol Shapes Analyzer CPSA (TACAS, 2007) to identify minimal realized skeletons, or "shapes," that are homomorphic images of A_phi. If psi holds in each of these shapes, then the goal holds

    A type reduction theory for systems with replicated components

    Full text link
    The Parameterised Model Checking Problem asks whether an implementation Impl(t) satisfies a specification Spec(t) for all instantiations of parameter t. In general, t can determine numerous entities: the number of processes used in a network, the type of data, the capacities of buffers, etc. The main theme of this paper is automation of uniform verification of a subclass of PMCP with the parameter of the first kind, i.e. the number of processes in the network. We use CSP as our formalism. We present a type reduction theory, which, for a given verification problem, establishes a function \phi that maps all (sufficiently large) instantiations T of the parameter to some fixed type T^ and allows us to deduce that if Spec(T^) is refined by \phi(Impl(T)), then (subject to certain assumptions) Spec(T) is refined by Impl(T). The theory can be used in practice by combining it with a suitable abstraction method that produces a t-independent process Abstr that is refined by {\phi}(Impl(T)) for all sufficiently large T. Then, by testing (with a model checker) if the abstract model Abstr refines Spec(T^), we can deduce a positive answer to the original uniform verification problem. The type reduction theory relies on symbolic representation of process behaviour. We develop a symbolic operational semantics for CSP processes that satisfy certain normality requirements, and we provide a set of translation rules that allow us to concretise symbolic transition graphs. Based on this, we prove results that allow us to infer behaviours of a process instantiated with uncollapsed types from known behaviours of the same process instantiated with a reduced type. One of the main advantages of our symbolic operational semantics and the type reduction theory is their generality, which makes them applicable in a wide range of settings

    Bidirectional Psychoneuroimmune Interactions in the Early Postpartum Period Influence Risk of Postpartum Depression

    Get PDF
    More than 500,000 U.S. women develop postpartum depression (PPD) annually. Although psychosocial risks are known, the underlying biology remains unclear. Dysregulation of the immune inflammatory response and the hypothalamic–pituitary–adrenal (HPA) axis are associated with depression in other populations. While significant research on the contribution of these systems to the development of PPD has been conducted, results have been inconclusive. This is partly because few studies have focused on whether disruption in the bidirectional and dynamic interaction between the inflammatory response and the HPA axis together influence PPD. In this study, we tested the hypothesis that disruption in the inflammatory-HPA axis bidirectional relationship would increase the risk of PPD. Plasma pro- and anti-inflammatory cytokines were measured in women during the 3rd trimester of pregnancy and on Days 7 and 14, and Months 1, 2, 3, and 6 after childbirth. Saliva was collected 5 times the day preceding blood draws for determination of cortisol area under the curve (AUC) and depressive symptoms were measured using the Edinburgh Postpartum Depression Survey (EPDS). Of the 152 women who completed the EPDS, 18% were depressed according to EDPS criteria within the 6 months postpartum. Cortisol AUC was higher in symptomatic women on Day 14 (p = .017). To consider the combined effects of cytokines and cortisol on predicting symptoms of PPD, a multiple logistic regression model was developed that included predictors identified in bivariate analyses to have an effect on depressive symptoms. Results indicated that family history of depression, day 14 cortisol AUC, and the day 14 IL8/IL10 ratio were significant predictors of PPD symptoms. One unit increase each in the IL8/IL10 ratio and cortisol AUC resulted in 1.50 (p = 0.06) and 2.16 (p = 0.02) fold increases respectively in the development of PPD. Overall, this model correctly classified 84.2% of individuals in their respective groups. Findings suggest that variability in the complex interaction between the inflammatory response and the HPA axis influence the risk of PPD

    The neuroscience of social feelings:mechanisms of adaptive social functioning

    Get PDF
    Social feelings have conceptual and empirical connections with affect and emotion. In this review, we discuss how they relate to cognition, emotion, behavior and well-being. We examine the functional neuroanatomy and neurobiology of social feelings and their role in adaptive social functioning. Existing neuroscience literature is reviewed to identify concepts, methods and challenges that might be addressed by social feelings research. Specific topic areas highlight the influence and modulation of social feelings on interpersonal affiliation, parent-child attachments, moral sentiments, interpersonal stressors, and emotional communication. Brain regions involved in social feelings were confirmed by meta-analysis using the Neurosynth platform for large-scale, automated synthesis of functional magnetic resonance imaging data. Words that relate specifically to social feelings were identfied as potential research variables. Topical inquiries into social media behaviors, loneliness, trauma, and social sensitivity, especially with recent physical distancing for guarding public and personal health, underscored the increasing importance of social feelings for affective and second person neuroscience research with implications for brain development, physical and mental health, and lifelong adaptive functioning
    • …
    corecore