Formal analysis of security properties in trusted computing protocols


Autoria(s): Seifi, Younes
Data(s)

2014

Resumo

This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/68606/

Publicador

Queensland University of Technology

Relação

http://eprints.qut.edu.au/68606/1/Younes_Seifi_Thesis.pdf

Seifi, Younes (2014) Formal analysis of security properties in trusted computing protocols. PhD thesis, Queensland University of Technology.

Fonte

School of Electrical Engineering & Computer Science; Institute for Future Environments; Science & Engineering Faculty

Palavras-Chave #Coloured Petri Nets #CPN #CPN/Tools #security analysis #TPM #SKAP #OSAP #Trusted Computing #ASK-CTL #formal anlysis
Tipo

Thesis