License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported license (CC BY-NC-ND 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/LIPIcs.FSTTCS.2008.1766
URN: urn:nbn:de:0030-drops-17662
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2008/1766/
Comon-Lundh, Hubert
About models of security protocols
Abstract
In this paper, mostly consisting of definitions, we revisit the models
of security protocols: we show that the symbolic and the computational
models (as well as others) are instances of a same generic model. Our
definitions are also parametrized by the security primitives, the
notion of attacker and, to some extent, the process calculus.
BibTeX - Entry
@InProceedings{comonlundh:LIPIcs:2008:1766,
author = {Hubert Comon-Lundh},
title = {{About models of security protocols}},
booktitle = {IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science},
pages = {352--356},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-939897-08-8},
ISSN = {1868-8969},
year = {2008},
volume = {2},
editor = {Ramesh Hariharan and Madhavan Mukund and V Vinay},
publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
address = {Dagstuhl, Germany},
URL = {http://drops.dagstuhl.de/opus/volltexte/2008/1766},
URN = {urn:nbn:de:0030-drops-17662},
doi = {10.4230/LIPIcs.FSTTCS.2008.1766},
annote = {Keywords: Protocols, security, concurrency, formal methods}
}
Keywords: |
|
Protocols, security, concurrency, formal methods |
Collection: |
|
IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science |
Issue Date: |
|
2008 |
Date of publication: |
|
05.12.2008 |