Modeling Security Protocols in CSP