DocumentCode :
3175680
Title :
Modeling and Verifying Security Protocols Using PAT Approach
Author :
Tuan, Luu Anh
Author_Institution :
Sch. of Comput., Nat. Univ. of Singapore, Singapore, Singapore
fYear :
2010
fDate :
9-11 June 2010
Firstpage :
157
Lastpage :
164
Abstract :
Security protocols play more and more important role nowadays, ranging from banking to electronic commerce systems. They are designed to provide properties such as authentication, key exchanges, key distribution, non-repudiation, proof of origin, integrity, confidentiality and anonymity, for users who wish to exchange messages over a medium over which they have little control. These properties are often difficult to characterize formally (or even informally). The protocols themselves often contain a great deal of combinatorial complexity, making their verification extremely difficult and prone to error. To overcome these obstacles, many different approaches are proposed such as using theorem provers or ranking systems. However, they are lack of automation, sufficiency in demand or time verification. In this paper, we will propose an approach using Real Time System (RTS) and an model checker PAT to deal with these problems.
Keywords :
cryptographic protocols; electronic commerce; program verification; real-time systems; PAT approach; RTS; authentication; combinatorial complexity; electronic commerce systems; key distribution; key exchanges; message exchange; real time system; security protocols; Algebra; Authentication; Automation; Banking; Cryptographic protocols; Electronic commerce; Explosions; National security; Public key cryptography; Real time systems; PAT; RTS; Security protocol; verification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Secure Software Integration and Reliability Improvement Companion (SSIRI-C), 2010 Fourth International Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-7644-2
Type :
conf
DOI :
10.1109/SSIRI-C.2010.34
Filename :
5521575
Link To Document :
بازگشت