Loading...

Modeling security protocols using operational semantics

Samadi, M ; Sharif University of Technology | 2010

461 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ICEIT.2010.5608394
  3. Publisher: 2010
  4. Abstract:
  5. In this paper we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e.g. the intruder model. Further characteristics of the model are a straightforward handling of parallel execution of multiple protocols, locality of security claims, the binding of local constants to role instances, and explicitly defined initial intruder knowledge. We validate our framework by analyzing the Needham-Schroeder-Lowe protocol
  6. Keywords:
  7. Formal method ; Intruder model ; Cryptographic ; Formal Semantics ; Generic models ; Intruder models ; Local constants ; Needham-Schroeder ; Operational semantics ; Parallel executions ; Parameterized ; Security protocols ; Computer programming languages ; Formal methods ; Information technology ; Network protocols ; Semantics ; Network security
  8. Source: ICEIT 2010 - 2010 International Conference on Educational and Information Technology, Proceedings, 17 September 2010 through 19 September 2010, Chongqing ; Volume 3 , 2010 , Pages V3179-V3185 ; 9781424480340 (ISBN)
  9. URL: http://ieeexplore.ieee.org/document/5608394/?reload=true