License
When quoting this document, please refer to the following
URN: urn:nbn:de:0030-drops-14173
URL: http://drops.dagstuhl.de/opus/volltexte/2008/1417/
Go to the corresponding Portal


Cremers, Cas

Complete Characterization of Security Protocols by Pattern Refinement

pdf-format:
Document 1.pdf (192 KB)


Abstract

Recently, the notion of complete characterizations of security protocols was introduced by Guttman and Thayer. We provide an alternative definition of this concept, and extend an existing protocol verification tool (Scyther) to compute our notion of complete characterization. We present both notions of complete characterization, discuss their relative merits, and provide preliminary empirical results using an extended version of the Scyther tool.

BibTeX - Entry

@InProceedings{cremers:DSP:2008:1417,
  author =	{Cas Cremers},
  title =	{Complete Characterization of Security Protocols by Pattern Refinement},
  booktitle =	{Formal Protocol Verification Applied},
  year =	{2008},
  editor =	{Liqun Chen and Steve Kremer and Mark D. Ryan},
  number =	{07421},
  series =	{Dagstuhl Seminar Proceedings},
  ISSN =	{1862-4405},
  publisher =	{Internationales Begegnungs- und Forschungszentrum f{\"u}r Informatik (IBFI), Schloss Dagstuhl, Germany},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2008/1417},
  annote =	{Keywords: Security protocols, Formal analysis, Verification, Tools}
}

Keywords: Security protocols, Formal analysis, Verification, Tools
Seminar: 07421 - Formal Protocol Verification Applied
Issue Date: 2008
Date of publication: 14.04.2008


DROPS-Home | Fulltext Search | Imprint Published by LZI