Analysis of security protocols

被引:0
|
作者
Durgin, NA [1 ]
Mitchell, JC [1 ]
机构
[1] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
来源
关键词
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Several approaches have been developed for analyzing security protocols. Most formal approaches are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a formalism based on multiset rewriting to describe these modeling assumptions and explain how they are used in protocol analysis. The unifying formalism makes it possible to discuss general optimizations and protocol simplifications that may be used in a variety of approaches. We also summarize some projects using the Dolev-Yao model and explain connections between our formalism and others in current use.
引用
收藏
页码:369 / 394
页数:26
相关论文
共 50 条
  • [1] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [2] A decidable analysis of security protocols
    Rusinowitch, M
    [J]. EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 21 - 21
  • [3] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
  • [4] Formal method for the analysis of security protocols
    Lu, Laifeng
    Ma, Jianfeng
    [J]. ICIC Express Letters, 2011, 5 (10): : 3785 - 3789
  • [5] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    [J]. NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [6] Towards a Quantitative Analysis of Security Protocols
    Adao, Pedro
    Mateus, Paulo
    Reis, Tiago
    Vigano, Luca
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 164 (03) : 3 - 25
  • [7] Theoretical Analysis of RFID Security Protocols
    Zavvari, A.
    Islam, M. T.
    Shakiba, M.
    Mandeep, S. J.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 302 - 306
  • [8] Analysis of Security Protocols for Mobile Healthcare
    Wazid, Mohammad
    Zeadally, Sherali
    Das, Ashok Kumar
    Odelu, Vanga
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [9] Verifying security protocols by knowledge analysis
    Ma, Xiaoqi
    Cheng, Xiaochun
    [J]. International Journal of Security and Networks, 2008, 3 (03) : 183 - 192
  • [10] Analysis of Security Protocols for Mobile Healthcare
    Mohammad Wazid
    Sherali Zeadally
    Ashok Kumar Das
    Vanga Odelu
    [J]. Journal of Medical Systems, 2016, 40