The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January (1996 vol.22)
pp: 16-30
ABSTRACT
<p><b>Abstract</b>—This paper develops a foundation for reasoning about protocol security. We adopt a model-based approach for defining protocol security properties. This allows us to describe security properties in greater detail and precision than previous frameworks. Our model allows us to reason about the security of protocols, and considers issues of beliefs of agents, time, and secrecy. We prove a composition theorem which allows us to state sufficient conditions on two secure protocols A and B such that they may be combined to form a new secure protocol C. Moreover, we give counter-examples to show that when the conditions are not met, the protocol C may not be secure.</p>
INDEX TERMS
Authentication, clocks, communication, composition, computer security, cryptography, formal methods, logic of authentication, model, model checking, protocol analysis, protocols, protocols-composition of, protocol analysis, security, time, timed models.
CITATION
Nevin Heintze, J.d. Tygar, "A Model for Secure Protocols and Their Compositions", IEEE Transactions on Software Engineering, vol.22, no. 1, pp. 16-30, January 1996, doi:10.1109/32.481514
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool