A Z based approach to verifying security protocols
| Contribuinte(s) |
J. Dong J. Woodcock |
|---|---|
| Data(s) |
01/01/2003
|
| Resumo |
Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism. |
| Identificador | |
| Idioma(s) |
eng |
| Publicador |
Springer |
| Palavras-Chave | #E1 #280302 Software Engineering #700199 Computer software and services not elsewhere classified |
| Tipo |
Conference Paper |