License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.07421.2
URN: urn:nbn:de:0030-drops-14186
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2008/1418/
Go to the corresponding Portal |
Chen, Liqun ;
Kremer, Steve ;
Ryan, Mark D.
07421 Executive Summary -- Formal Protocol Verification Applied
Abstract
Security protocols are a core part of distributed computing systems,
and are part of our everyday life since they are used in web servers,
email, mobile phones, bank transactions, etc. However, security
protocols are notoriously difficult to get right. There are many cases
of protocols which are proposed and considered secure for many years,
but later found to have security flaws. Formal methods offer a
promising way for automated security analysis of protocols. While
there have been considerable advances in this area, most techniques
have only been applied to academic case studies and security
properties such as secrecy and authentication. The
seminar brought together researchers deploying security protocols
in new application areas, cryptographers, and researchers from formal
methods who analyse security protocols. The interaction between
researchers from these different communities aims to open new research
topics, e.g., identify new security properties that need verification
and refine abstractions of the abstract models of crytpographic
primitives.
BibTeX - Entry
@InProceedings{chen_et_al:DagSemProc.07421.2,
author = {Chen, Liqun and Kremer, Steve and Ryan, Mark D.},
title = {{07421 Executive Summary – Formal Protocol Verification Applied}},
booktitle = {Formal Protocol Verification Applied},
pages = {1--2},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {7421},
editor = {Liqun Chen and Steve Kremer and Mark D. Ryan},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2008/1418},
URN = {urn:nbn:de:0030-drops-14186},
doi = {10.4230/DagSemProc.07421.2},
annote = {Keywords: Security protocols, formal verification, trusted computing, biometrics, security of mobile computing, electronic voting, payment systems}
}
Keywords: |
|
Security protocols, formal verification, trusted computing, biometrics, security of mobile computing, electronic voting, payment systems |
Collection: |
|
07421 - Formal Protocol Verification Applied |
Issue Date: |
|
2008 |
Date of publication: |
|
14.04.2008 |