Formal analysis of security properties in trusted computing protocols
Data(s) |
2014
|
---|---|
Resumo |
This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties. |
Formato |
application/pdf |
Identificador | |
Publicador |
Queensland University of Technology |
Relação |
http://eprints.qut.edu.au/68606/1/Younes_Seifi_Thesis.pdf Seifi, Younes (2014) Formal analysis of security properties in trusted computing protocols. PhD thesis, Queensland University of Technology. |
Fonte |
School of Electrical Engineering & Computer Science; Institute for Future Environments; Science & Engineering Faculty |
Palavras-Chave | #Coloured Petri Nets #CPN #CPN/Tools #security analysis #TPM #SKAP #OSAP #Trusted Computing #ASK-CTL #formal anlysis |
Tipo |
Thesis |