Search Results

Documents authored by Cremers, Cas


Document
Complete Characterization of Security Protocols by Pattern Refinement

Authors: Cas Cremers

Published in: Dagstuhl Seminar Proceedings, Volume 7421, Formal Protocol Verification Applied (2008)


Abstract
Recently, the notion of complete characterizations of security protocols was introduced by Guttman and Thayer. We provide an alternative definition of this concept, and extend an existing protocol verification tool (Scyther) to compute our notion of complete characterization. We present both notions of complete characterization, discuss their relative merits, and provide preliminary empirical results using an extended version of the Scyther tool.

Cite as

Cas Cremers. Complete Characterization of Security Protocols by Pattern Refinement. In Formal Protocol Verification Applied. Dagstuhl Seminar Proceedings, Volume 7421, pp. 1-11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{cremers:DagSemProc.07421.3,
  author =	{Cremers, Cas},
  title =	{{Complete Characterization of Security Protocols by Pattern Refinement}},
  booktitle =	{Formal Protocol Verification Applied},
  pages =	{1--11},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{7421},
  editor =	{Liqun Chen and Steve Kremer and Mark D. Ryan},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07421.3},
  URN =		{urn:nbn:de:0030-drops-14173},
  doi =		{10.4230/DagSemProc.07421.3},
  annote =	{Keywords: Security protocols, Formal analysis, Verification, Tools}
}
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail