DocumentCode :
1887176
Title :
Modeling and verifying security protocols using UML 2
Author :
Smith, Sandra ; Beaulieu, Alain ; Phillips, W. Greg
Author_Institution :
Dept. of Electr. & Comput. Eng., R. Mil. Coll. of Canada, Kingston, ON, Canada
fYear :
2011
fDate :
4-7 April 2011
Firstpage :
72
Lastpage :
79
Abstract :
Large scale distributed systems often require security protocols to ensure high integrity. We present a modeling approach that uses UML 2 without extensions to support the design, composition and verification of security protocols. The approach assumes a strong threat model, in which an attacker can intercept, modify, and spoof all communications, with the exception of those protected by known-strong encryption. Through a series of models of extensively-studied protocols we demonstrate that the approach allows protocol properties to be accurately represented, and protocols to be automatically tested to detect potential security flaws. The approach benefits from the existing strong tool support for UML 2, allowing automatic generation of protocol implementations from the models.
Keywords :
Unified Modeling Language; cryptographic protocols; UML; automatic generation; encryption; large scale distributed system; security protocol composition; security protocol verification; Object oriented modeling; Protocols; Security; Servers; Software; Unified modeling language; Visualization; Model Driven Development; Security Protocols; UML 2; Visual Modeling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems Conference (SysCon), 2011 IEEE International
Conference_Location :
Montreal, QC
Print_ISBN :
978-1-4244-9494-1
Type :
conf
DOI :
10.1109/SYSCON.2011.5929088
Filename :
5929088
Link To Document :
بازگشت