Analysis of security protocols

被引:0
|
作者
Durgin, NA [1 ]
Mitchell, JC [1 ]
机构
[1] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
来源
关键词
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Several approaches have been developed for analyzing security protocols. Most formal approaches are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a formalism based on multiset rewriting to describe these modeling assumptions and explain how they are used in protocol analysis. The unifying formalism makes it possible to discuss general optimizations and protocol simplifications that may be used in a variety of approaches. We also summarize some projects using the Dolev-Yao model and explain connections between our formalism and others in current use.
引用
收藏
页码:369 / 394
页数:26
相关论文
共 50 条
  • [41] Untraceable Analysis of Scalable RFID Security Protocols
    Xiuqing Chen
    Kai Ma
    Deqin Geng
    Jingxuan Zhai
    Wei Liu
    Hongwei Zhang
    Tingting Zhu
    Xue Piao
    [J]. Wireless Personal Communications, 2019, 109 : 1747 - 1767
  • [42] VANET authentication protocols: security analysis and a proposal
    Otto B. Piramuthu
    Matthew Caesar
    [J]. The Journal of Supercomputing, 2023, 79 : 2153 - 2179
  • [43] Automated analysis of security protocols with global state
    Kremer, Steve
    Kunnemann, Robert
    [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 163 - 178
  • [44] Quantitative analysis of security protocols in wireless networks
    Best, P
    Namuduri, K
    Pendse, R
    [J]. IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 290 - 291
  • [45] Security analysis of IoT protocols: A focus in CoAP
    Rahman, Reem Abdul
    Shah, Babar
    [J]. 2016 3RD MEC INTERNATIONAL CONFERENCE ON BIG DATA AND SMART CITY (ICBDSC), 2016, : 172 - 178
  • [46] A simple process calculus for the analysis of security protocols
    Gu, YG
    Fu, YX
    Li, GQ
    [J]. PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 110 - 114
  • [47] Security and Forensic Analysis for Industrial Ethernet Protocols
    Yu, Geon
    Shon, Taeshik
    [J]. 2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22), 2022, : 63 - 65
  • [48] On Some Time Aspects in Security Protocols Analysis
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    [J]. COMPUTER NETWORKS, CN 2018, 2018, 860 : 344 - 356
  • [49] On the automatic analysis of recursive security protocols with XOR
    Kuesters, Ralf
    Truderung, Tomasz
    [J]. STACS 2007, PROCEEDINGS, 2007, 4393 : 646 - +
  • [50] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220