DocumentCode :
2236680
Title :
Verifying authentication protocols: methodology and example
Author :
Woo, Thomas Y C ; Lam, Simon S.
Author_Institution :
Dept. of Comput. Sci., Texas Univ., Austin, TX, USA
fYear :
1993
fDate :
19-22 Oct 1993
Firstpage :
36
Lastpage :
45
Abstract :
The authors present a new approach to the analysis of authentication protocols. The approach consists of several elements: a specification language for formally specifying authentication protocols, a semantic model for characterizing protocol executions, an assertion language for stating secrecy and correspondence properties, and procedures for verifying these properties. The main emphasis of this paper is on the assertion language, its semantics, and verification procedures. In particular, the authors present a set of proof rules. An example is given to illustrate the approach
Keywords :
formal specification; formal verification; message authentication; protocols; specification languages; telecommunication computing; assertion language; authentication protocols analysis; correspondence properties; formal specification; proof rules; protocol executions; secrecy; semantic model; specification language; verification procedures; Authentication; Body sensor networks; Computer security; Contracts; Logic; Proposals; Protocols; Specification languages; Workstations;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Protocols, 1993. Proceedings., 1993 International Conference on
Conference_Location :
San Francisco, CA
Print_ISBN :
0-8186-3670-X
Type :
conf
DOI :
10.1109/ICNP.1993.340904
Filename :
340904
Link To Document :
بازگشت