Modeling Security Protocols in CSP
n We assume that each process has channels
n Receive
n Send
   that it uses for all communications with the
other nodes via the medium
n Let us assume that A (Anne) and B (Bob) use
the protocol, with A as initiator  and B as
responder, and that J (Jeeves) is the
secure server