A Z based approach to verifying security protocols
Contribuinte(s) |
J. Dong J. Woodcock |
---|---|
Data(s) |
01/01/2003
|
Resumo |
Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism. |
Identificador | |
Idioma(s) |
eng |
Publicador |
Springer |
Palavras-Chave | #E1 #280302 Software Engineering #700199 Computer software and services not elsewhere classified |
Tipo |
Conference Paper |