This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2009 WRI World Congress on Computer Science and Information Engineering
Formal Modeling and Analyzing Kerberos Protocol
Los Angeles, California USA
March 31-April 02
ISBN: 978-0-7695-3507-4
Kerberos protocol is one of the popular security protocols used to authenticate the identities of the communication participants. The key distribution mechanism in this protocol is suitable for other secure applications. We formalize the protocol using CSP methods. Based on the formal model, the mechanism of the protocol is exposed to us clearly. Principles and tools support the verification of the formal model. In that way, we can prove that the system protected by the protocol is indeed secure as it declared. The reasons for security can be fixed out formally as a reference to analyzing other protocols.
Index Terms:
Formal Methods, Kerberos Protocol, Security
Citation:
Qin Li, Fan Yang, Huibiao Zhu, Longfei Zhu, "Formal Modeling and Analyzing Kerberos Protocol," csie, vol. 7, pp.813-819, 2009 WRI World Congress on Computer Science and Information Engineering, 2009
Usage of this product signifies your acceptance of the Terms of Use.