DocumentCode :
2507217
Title :
A hierarchy of authentication specifications
Author :
Lowe, Gavin
Author_Institution :
Dept. of Math. & Comput. Sci., Leicester Univ., UK
fYear :
1997
fDate :
10-12 Jun 1997
Firstpage :
31
Lastpage :
43
Abstract :
Many security protocols have the aim of authenticating one agent to another. Yet there is no clear consensus in the academic literature about precisely what “authentication” means. We suggest that the appropriate authentication requirement will depend upon the use to which the protocol is put, and identify several possible definitions of “authentication”. We formalize each definition using the process algebra CSP, use this formalism to study their relative strengths, and show how the model checker FDR can be used to test whether a system running the protocol meets such a specification
Keywords :
authorisation; communicating sequential processes; formal specification; formal verification; message authentication; protocols; authentication requirement; authentication specifications hierarchy; model checker FDR; process algebra CSP; security protocols; Algebra; Authentication; Computer science; Computer security; Control systems; Mathematics; Protocols; Stress; System testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 1997. Proceedings., 10th
Conference_Location :
Rockport, MA
ISSN :
1063-6900
Print_ISBN :
0-8186-7990-5
Type :
conf
DOI :
10.1109/CSFW.1997.596782
Filename :
596782
Link To Document :
بازگشت