On BAN logics for industrial security protocols

被引:0
|
作者
Agray, N [1 ]
van der Hoek, W
de Vink, E
机构
[1] Univ Utrecht, Inst Informat & Comp Sci, Utrecht, Netherlands
[2] Univ Liverpool, Dept Comp Sci, Liverpool, Merseyside, England
[3] Tech Univ Eindhoven, Dept Comp Sci, NL-5600 MB Eindhoven, Netherlands
[4] Leiden Univ, Leiden Inst Adv Comp Sci, Leiden, Netherlands
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism is lacking, BAN logic provides an intuitive and powerful technique for security analysis.
引用
收藏
页码:29 / 36
页数:8
相关论文
共 50 条
  • [41] IoT Security: A review of vulnerabilities and security protocols
    Varma, Ravi Kiran P.
    Priyanka, M.
    Krishna, Vamsi B. S.
    Raju, Subba K., V
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 509 - 520
  • [42] Information Assurance for security protocols
    Bella, G
    Bistarelli, S
    COMPUTERS & SECURITY, 2005, 24 (04) : 322 - 333
  • [43] PROTOCOLS FOR DATA-SECURITY
    DEMILLO, R
    MERRITT, M
    COMPUTER, 1983, 16 (02) : 39 - 51
  • [44] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [45] What is Correctness of Security Protocols?
    Bella, Giampaolo
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2008, 14 (12) : 2083 - 2106
  • [46] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [47] Safely composing security protocols
    Cortier, Veronique
    Delaitre, Jeremie
    Delaune, Stephanie
    FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 352 - 363
  • [48] Automated Composition of Security Protocols
    Bela, Genge
    Ignat, Iosif
    Piroska, Haller
    2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 251 - +
  • [49] The revised US refugee ban, health, and security
    Rubenstein, Leonard
    Spiegel, Paul
    LANCET, 2017, 389 (10075): : 1189 - 1190
  • [50] NATIONAL-SECURITY AND THE TEST BAN ISSUE
    不详
    ORBIS-A JOURNAL OF WORLD AFFAIRS, 1963, 7 (02): : 199 - 202