License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported license (CC BY-NC-ND 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/LIPIcs.FSTTCS.2008.1766
URN: urn:nbn:de:0030-drops-17662
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2008/1766/
Go to the corresponding LIPIcs Volume Portal


Comon-Lundh, Hubert

About models of security protocols

pdf-format:
08004.Comon_LundhHubert.1766.pdf (0.4 MB)


Abstract

In this paper, mostly consisting of definitions, we revisit the models
of security protocols: we show that the symbolic and the computational
models (as well as others) are instances of a same generic model. Our
definitions are also parametrized by the security primitives, the
notion of attacker and, to some extent, the process calculus.

BibTeX - Entry

@InProceedings{comonlundh:LIPIcs:2008:1766,
  author =	{Hubert Comon-Lundh},
  title =	{{About  models of security protocols}},
  booktitle =	{IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science},
  pages =	{352--356},
  series =	{Leibniz International Proceedings in Informatics (LIPIcs)},
  ISBN =	{978-3-939897-08-8},
  ISSN =	{1868-8969},
  year =	{2008},
  volume =	{2},
  editor =	{Ramesh Hariharan and Madhavan Mukund and V Vinay},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2008/1766},
  URN =		{urn:nbn:de:0030-drops-17662},
  doi =		{10.4230/LIPIcs.FSTTCS.2008.1766},
  annote =	{Keywords: Protocols, security, concurrency, formal methods}
}

Keywords: Protocols, security, concurrency, formal methods
Collection: IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science
Issue Date: 2008
Date of publication: 05.12.2008


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI