Secure Software Integration and Reliability Improvement Companion, IEEE International Conference on (2010)
June 9, 2010 to June 11, 2010
Security protocols play more and more important role nowadays, ranging from banking to electronic commerce systems. They are designed to provide properties such as authentication, key exchanges, key distribution, non-repudiation, proof of origin, integrity, confidentiality and anonymity, for users who wish to exchange messages over a medium over which they have little control. These properties are often difficult to characterize formally (or even informally). The protocols themselves often contain a great deal of combinatorial complexity, making their verification extremely difficult and prone to error. To overcome these obstacles, many different approaches are proposed such as using theorem provers or ranking systems. However, they are lack of automation, sufficiency in demand or time verification. In this paper, we will propose an approach using Real Time System (RTS) and an model checker PAT to deal with these problems.
Security protocol, PAT, verification, RTS
L. A. Tuan, "Modeling and Verifying Security Protocols Using PAT Approach," Secure Software Integration and Reliability Improvement Companion, IEEE International Conference on(SSIRI-C), Singapore, Singapore, 2010, pp. 157-164.