Issue No. 01 - January (1996 vol. 22)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/32.481514
<p><b>Abstract</b>—This paper develops a foundation for reasoning about protocol security. We adopt a model-based approach for defining protocol security properties. This allows us to describe security properties in greater detail and precision than previous frameworks. Our model allows us to reason about the security of protocols, and considers issues of beliefs of agents, time, and secrecy. We prove a composition theorem which allows us to state sufficient conditions on two secure protocols A and B such that they may be combined to form a new secure protocol C. Moreover, we give counter-examples to show that when the conditions are not met, the protocol C may not be secure.</p>
Authentication, clocks, communication, composition, computer security, cryptography, formal methods, logic of authentication, model, model checking, protocol analysis, protocols, protocols-composition of, protocol analysis, security, time, timed models.
J. Tygar and N. Heintze, "A Model for Secure Protocols and Their Compositions," in IEEE Transactions on Software Engineering, vol. 22, no. , pp. 16-30, 1996.