Proof-Based Design of Security Protocols

CSR'10 Proceedings of the 5th international conference on Computer Science: theory and Applications(2010)

引用 1|浏览0
暂无评分
摘要
We consider the refinement-based process for the development of security protocols. Our approach is based on the Event B refinement, which makes proofs easier and which makes the design process faithfull to the structure of the protocol as the designer thinks of it. We introduce the notion of mechanism related to a given security property; a mechanism can be combined with another mechanism through the double refinement process ensuring the preservation of previous security properties of mechanisms. Mechanisms and combination of mechanisms are based on Event B models related to the security property of the current mechanism. Analysing cryptographic protocols requires precise modelling of the attacker’s knowledge and the attacker’s behaviour conforms to the Dolev-Yao model.
更多
查看译文
关键词
refinement-based process,design process faithfull,event b model,dolev-yao model,security property,double refinement process,security protocol,event b refinement,proof-based design,previous security property,current mechanism,cryptographic protocol,design thinking,design process
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要