O'Reilly logo

The Modelling and Analysis of Security Protocols: the CSP Approach by S. A. Schneider, P. Y.A. Ryan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

1.1. Basic building blocks

The only way in which one CSP process interacts with others, or with us as observers, is by communicating. Communications take the form of visible events or actions; processes can often also perform invisible actions that represent some sort of internal progress, but these have no direct effect on the outside world. The set of all visible events is called Σ (the Greek capital letter sigma). There is usually no reason to have any more than one internal action, and it is conventionally written Τ (the Greek letter tau).

The language of CSP provides us with a way of describing the states in which processes might be. What the language describing the state has to do is to allow us to work out what actions are immediately ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required