License
when quoting this document, please refer to the following
URN: urn:nbn:de:0030-drops-14186
URL: http://drops.dagstuhl.de/opus/volltexte/2008/1418/

Chen, Liqun ; Kremer, Steve ; Ryan, Mark D.

07421 Executive Summary -- Formal Protocol Verification Applied

pdf-format:
Dokument 1.pdf (68 KB)


Abstract

Security protocols are a core part of distributed computing systems, and are part of our everyday life since they are used in web servers, email, mobile phones, bank transactions, etc. However, security protocols are notoriously difficult to get right. There are many cases of protocols which are proposed and considered secure for many years, but later found to have security flaws. Formal methods offer a promising way for automated security analysis of protocols. While there have been considerable advances in this area, most techniques have only been applied to academic case studies and security properties such as secrecy and authentication. The seminar brought together researchers deploying security protocols in new application areas, cryptographers, and researchers from formal methods who analyse security protocols. The interaction between researchers from these different communities aims to open new research topics, e.g., identify new security properties that need verification and refine abstractions of the abstract models of crytpographic primitives.

BibTeX - Entry

@InProceedings{chen_et_al:DSP:2008:1418,
  author =	{Liqun Chen and Steve Kremer and Mark D. Ryan},
  title =	{07421 Executive Summary -- Formal Protocol Verification Applied},
  booktitle =	{Formal Protocol Verification Applied},
  year =	{2008},
  editor =	{Liqun Chen and Steve Kremer and Mark D. Ryan},
  number =	{07421},
  series =	{Dagstuhl Seminar Proceedings},
  ISSN =	{1862-4405},
  publisher =	{Internationales Begegnungs- und Forschungszentrum f{\"u}r Informatik (IBFI), Schloss Dagstuhl, Germany},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2008/1418},
  annote =	{Keywords: Security protocols, formal verification, trusted computing, biometrics, security of mobile computing, electronic voting, payment systems}
}

Keywords: Security protocols, formal verification, trusted computing, biometrics, security of mobile computing, electronic voting, payment systems
Seminar: 07421 - Formal Protocol Verification Applied
Issue date: 2008
Date of publication: 14.04.2008


DROPS-Home | Fulltext Search | Imprint Published by LZI