Formal verification of secure group communication protocols modelled in UML

被引:3
|
作者
de Saqui-Sannes, P. [1 ,2 ,3 ,4 ]
Villemur, T. [1 ,2 ,3 ,4 ]
Fontan, B. [3 ,4 ,5 ,6 ]
Mota, S. [4 ,5 ,6 ,7 ]
Bouassida, M. S. [5 ,6 ,7 ,8 ]
Chridi, N. [6 ,7 ,8 ,9 ]
Chrisment, I. [6 ,7 ,8 ,9 ]
Vigneron, L. [6 ,7 ,8 ,9 ]
机构
[1] CNRS, 7 Ave Colonel Roche, F-31077 Toulouse, France
[2] LAAS, F-31077 Toulouse, France
[3] Univ Toulouse, F-31077 Toulouse, France
[4] UPS, INSA, INP, ISAE, F-31077 Toulouse, France
[5] LAAS, F-31077 Toulouse, France
[6] THALES Res & Technol France, F-91767 Palaiseau, France
[7] ITESM, San Antonio Buenavista, Toluca, Mexico
[8] CNRS, Lab Heudiasyc, UMR 6599, Compiegne, France
[9] Univ Nancy, LORIA, F-54506 Vandoeuvre Les Nancy, France
关键词
UML; Formal verification; Security; Real-time; Group protocols;
D O I
10.1007/s11334-010-0122-3
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The paper discusses an experience in using Unified Modelling Language and two complementary verification tools in the framework of SAFECAST, a project on secured group communication systems design. AVISPA enabled detecting and fixing security flaws. The TURTLE toolkit enabled saving development time by eliminating design solutions with inappropriate temporal parameters.
引用
收藏
页码:125 / 133
页数:9
相关论文
共 50 条
  • [1] FORMAL SPECIFICATION AND VERIFICATION OF SECURE COMMUNICATION PROTOCOLS
    KNAPSKOG, SJ
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 58 - 73
  • [2] Communication space reduction for formal verification of secure authentication protocols
    Kim, K
    Abraham, JA
    [J]. THIRD INTERNATIONAL WORKSHOP ON ADVANCED ISSUES OF E-COMMERCE AND WEB-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2001, : 225 - 227
  • [3] Formal Verification of Secure Forwarding Protocols
    Klenze, Tobias
    Sprenger, Christoph
    Basin, David
    [J]. 2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 313 - 328
  • [4] Verification of Communication Protocols Based on Formal Methods Integration
    Simonak, Slavomir
    [J]. ACTA POLYTECHNICA HUNGARICA, 2012, 9 (04) : 117 - 128
  • [5] FORMAL TECHNIQUES FOR THE SPECIFICATION, VERIFICATION AND CONSTRUCTION OF COMMUNICATION PROTOCOLS
    CHOI, TY
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1985, 23 (10) : 46 - 52
  • [6] Formal Specifications and Verification of a Secure Communication Protocol Model
    Xia Yang 1
    2. Research Center for Information Network Security
    [J]. Journal of Systems Engineering and Electronics, 2003, (02) : 90 - 97
  • [7] Modeling and Formal Verification of Communication Protocols for Remote Procedure Call
    Halder, Nilimesh
    Islam, A. B. M. Tariqul
    Bin Song, Ju
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 63 - 71
  • [8] Formal consistency verification of deliberative agents with respect to communication protocols
    Ramírez, J
    de Antonio, A
    [J]. FORMAL APPROACHES TO AGENT-BASED SYSTEMS, 2005, 3228 : 222 - 237
  • [9] Formal verification of communication protocols using quantized Horn clauses
    Balu, Radhakrishnan
    [J]. QUANTUM INFORMATION AND COMPUTATION IX, 2016, 9873
  • [10] Formal modeling and verification of security protocols on cloud computing systems based on UML 2.3
    Fang, Kunding
    Li, Xiaohong
    Hao, Jianye
    Feng, Zhiyong
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 852 - 859