License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.07421.3
URN: urn:nbn:de:0030-drops-14173
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2008/1417/
Go to the corresponding Portal |
Cremers, Cas
Complete Characterization of Security Protocols by Pattern Refinement
Abstract
Recently, the notion of complete characterizations of security protocols was
introduced by Guttman and Thayer. We provide an alternative definition of this
concept, and extend an existing protocol verification tool (Scyther) to compute
our notion of complete characterization.
We present both notions of complete characterization, discuss their relative
merits, and provide preliminary empirical results using an extended version of
the Scyther tool.
BibTeX - Entry
@InProceedings{cremers:DagSemProc.07421.3,
author = {Cremers, Cas},
title = {{Complete Characterization of Security Protocols by Pattern Refinement}},
booktitle = {Formal Protocol Verification Applied},
pages = {1--11},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {7421},
editor = {Liqun Chen and Steve Kremer and Mark D. Ryan},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2008/1417},
URN = {urn:nbn:de:0030-drops-14173},
doi = {10.4230/DagSemProc.07421.3},
annote = {Keywords: Security protocols, Formal analysis, Verification, Tools}
}
Keywords: |
|
Security protocols, Formal analysis, Verification, Tools |
Collection: |
|
07421 - Formal Protocol Verification Applied |
Issue Date: |
|
2008 |
Date of publication: |
|
14.04.2008 |