DocumentCode :
2656828
Title :
Modeling security protocols using operational semantics
Author :
Samadi, Masoud ; Mahrooghi, Hamidreza ; Movaghar, Ali ; Faraahi, Ahmad
Author_Institution :
Dept. of Inf. Technol. & Commun., Payame noor Univ., Tehran, Iran
Volume :
3
fYear :
2010
fDate :
17-19 Sept. 2010
Abstract :
In this paper we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e.g. the intruder model. Further characteristics of the model are a straightforward handling of parallel execution of multiple protocols, locality of security claims, the binding of local constants to role instances, and explicitly defined initial intruder knowledge. We validate our framework by analyzing the Needham-Schroeder-Lowe protocol.
Keywords :
formal specification; protocols; security of data; Needham-Schroeder-Lowe protocol; initial intruder knowledge; local constants binding; multiple protocol handling; operational semantics; security claims locality; security protocol modeling; Cryptography; Protocols; Cryptographic; Formal method; Intruder model; Operational semantics;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Educational and Information Technology (ICEIT), 2010 International Conference on
Conference_Location :
Chongqing
Print_ISBN :
978-1-4244-8033-3
Electronic_ISBN :
978-1-4244-8035-7
Type :
conf
DOI :
10.1109/ICEIT.2010.5608394
Filename :
5608394
Link To Document :
بازگشت