The Community for Technology Leaders
Green Image
<p><b>Abstract</b>—This paper develops a foundation for reasoning about protocol security. We adopt a model-based approach for defining protocol security properties. This allows us to describe security properties in greater detail and precision than previous frameworks. Our model allows us to reason about the security of protocols, and considers issues of beliefs of agents, time, and secrecy. We prove a composition theorem which allows us to state sufficient conditions on two secure protocols A and B such that they may be combined to form a new secure protocol C. Moreover, we give counter-examples to show that when the conditions are not met, the protocol C may not be secure.</p>
Authentication, clocks, communication, composition, computer security, cryptography, formal methods, logic of authentication, model, model checking, protocol analysis, protocols, protocols-composition of, protocol analysis, security, time, timed models.
J.d. Tygar, Nevin Heintze, "A Model for Secure Protocols and Their Compositions", IEEE Transactions on Software Engineering, vol. 22, no. , pp. 16-30, January 1996, doi:10.1109/32.481514
92 ms
(Ver 3.3 (11022016))