automatic verification of security properties of remote
TRANSCRIPT
( )1 l
M,N,T,V:: terms x variable a,b,c,.....,m,n name
f M , ,M function application
=
L
A,B,C:: extended processes P plain process
A B parallel composition
vn.A
=
{ }
name restriction vx.A variable restriction
M active substituation
P,Q,R :: plain processes 0 null process
Q P parallel composition
!P
=
( )
replication vn.P name restriction if M N then P else Q conditional
in u,x .P message inpu
=
( )t
out u,N .P message output
( ) ( )
( )
AR
AR
AR
EPL
EW
EW
EW AR
P -0 A A 0
P -A A B C A B C
P -C A B B A
R !P P !P
N -0 n.0 0N -C vu.vv.A vv.vu.A
N -P A vu.B vu. A B whe
≡
≡
≡
≡
≡≡
≡ ( ) ( )
{ }{ } { } { }
{ } { }
LIAS
UBST
EWRITE
n u fv A fn A
MA vx. 0xM M MS A Ax x x
M nR when M Nx x
∉ ∪
≡
≡
≡ − =∑