Formal Correctness of Security Protocols by Giampaolo Bella.

Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties. The author investigates proofs of c...

Full description

Saved in:
Bibliographic Details
Main Author: Bella, Giampaolo (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edition:1st ed. 2007.
Series:Information Security and Cryptography,
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • The Analysis of Security Protocols
  • The Inductive Method
  • Verifying the Protocol Goals
  • The Principle of Goal Availability
  • Modelling Timestamping and Verifying a Classical Protocol
  • Verifying a Deployed Protocol
  • Modelling Agents’ Knowledge of Messages
  • Verifying Another Deployed Protocol
  • Modelling Smartcards
  • Verifying a Smartcard Protocol
  • Modelling Accountability
  • Verifying Two Accountability Protocols
  • Conclusions.