Complete Characterization of Security Protocols by Pattern Refinement

Author Cas Cremers



PDF
Thumbnail PDF

File

DagSemProc.07421.3.pdf
  • Filesize: 191 kB
  • 11 pages

Document Identifiers

Author Details

Cas Cremers

Cite As Get BibTex

Cas Cremers. Complete Characterization of Security Protocols by Pattern Refinement. In Formal Protocol Verification Applied. Dagstuhl Seminar Proceedings, Volume 7421, pp. 1-11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008) https://doi.org/10.4230/DagSemProc.07421.3

Abstract

Recently, the notion of complete characterizations of security protocols was
introduced by Guttman and Thayer. We provide an alternative definition of this
concept, and extend an existing protocol verification tool (Scyther) to compute
our notion of complete characterization.
We present both notions of complete characterization, discuss their relative
merits, and provide preliminary empirical results using an extended version of
the Scyther tool.

Subject Classification

Keywords
  • Security protocols
  • Formal analysis
  • Verification
  • Tools

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail