A Coordination-based Methodology for Security Protocol Verification

被引:3
|
作者
Baldi, Giacomo [1 ]
Bracciali, Andrea [1 ]
Ferrari, Gianluigi [1 ]
Tuosto, Emilio [1 ]
机构
[1] Dipartimento Informat, Via F Buonarroti 2, I-56127 Pisa, Italy
关键词
Formal methods; formal certification; security protocols; open systems; symbolic model checking;
D O I
10.1016/j.entcs.2004.10.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The quest for the formal certification of properties of systems is one of the most challenging research issues in the field of formal methods. It requires the development of formal models together with effective verification techniques. In this paper, we describe a formal methodology for verifying security protocols based on ideas borrowed from the analysis of open systems, where applications interact with one another by dynamically sharing common resources and services in a not fully trusted environment. The methodology is supported by ASPASyA, a tool based on symbolic model checking techniques.
引用
收藏
页码:23 / 46
页数:24
相关论文
共 50 条
  • [41] Molecule and Electron Transfer through Coordination-Based Molecular Assemblies
    Motiei, Leila
    Kaminker, Revital
    Sassi, Mauro
    van der Boom, Milko E.
    JOURNAL OF THE AMERICAN CHEMICAL SOCIETY, 2011, 133 (36) : 14264 - 14266
  • [42] Model-based verification of a security protocol for conditional access to services
    Leduc, G.
    Bonaventure, O.
    Leonard, L.
    Koerner, E.
    Pecheur, C.
    Formal Methods in System Design, 14 (02): : 171 - 191
  • [43] Model-based verification of a security protocol for conditional access to services
    Leduc, G
    FORMAL METHODS IN SYSTEM DESIGN, 1999, 14 (02) : 171 - 191
  • [44] Modular coordination-based generative algorithm to optimize construction waste
    Banihashemi, Saeed
    Tabadkani, Amir
    Hosseini, M. Reza
    INTERNATIONAL HIGH-PERFORMANCE BUILT ENVIRONMENT CONFERENCE - A SUSTAINABLE BUILT ENVIRONMENT CONFERENCE 2016 SERIES (SBE16), IHBE 2016, 2017, 180 : 631 - 639
  • [45] Model-Based Verification of a Security Protocol for Conditional Access to Services
    G. Leduc
    O. Bonaventure
    L. Léonard
    E. Koerner
    C. Pecheur
    Formal Methods in System Design, 1999, 14 : 171 - 191
  • [46] Adaptive access control in coordination-based mobile agent systems
    Julien, C
    Payton, J
    Roman, GC
    SOFTWARE ENGINEERING FOR MULTI-AGENT SYSTEMS III: RESEARCH ISSUES AND PRACTICAL APPLICATIONS, 2004, 3390 : 254 - 271
  • [47] Stepwise Assembly of Coordination-Based Metal-Organic Networks
    Kaminker, Revital
    Motiei, Leila
    Gulino, Antonino
    Fragala, Ignazio
    Shimon, Linda J. W.
    Evmenenko, Guennadi
    Dutta, Pulak
    Iron, Mark A.
    van der Boom, Milko E.
    JOURNAL OF THE AMERICAN CHEMICAL SOCIETY, 2010, 132 (41) : 14554 - 14561
  • [48] Agents coordination-based web infrastructure for personalized Web searching
    Helmy, T
    Amamiya, S
    Mine, T
    Amamiya, M
    IC-AI'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOLS I-III, 2001, : 97 - 103
  • [49] Design and verification of a coordination protocol for cooperating systems
    J. P. Thomas
    Soft Computing, 2000, 4 (2) : 130 - 140
  • [50] Minimum-energy data dissemination in coordination-based sensor networks
    Xuan, HL
    Seo, DH
    Lee, S
    Lee, YK
    11TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2005, : 381 - 386