A Z based approach to verifying security protocols


Autoria(s): Long, B. W.; Fidge, C. J.; Cerone, A.
Contribuinte(s)

J. Dong

J. Woodcock

Data(s)

01/01/2003

Resumo

Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism.

Identificador

http://espace.library.uq.edu.au/view/UQ:98497

Idioma(s)

eng

Publicador

Springer

Palavras-Chave #E1 #280302 Software Engineering #700199 Computer software and services not elsewhere classified
Tipo

Conference Paper