Back to Search
Start Over
The Concept of Layered Proving Trees and Its Application to the Automation of Security Protocol Verification.
- Source :
- ACM Transactions on Information & System Security (TISSEC); Aug2005, Vol. 8 Issue 3, p287-311, 25p, 3 Diagrams, 2 Charts
- Publication Year :
- 2005
-
Abstract
- Security protocols are one of the most critical elements in enabling the secure communication and processing of information. The presence of flaws in published protocols highlights the complexity of security protocol design. Only formal verification can provide strong confidence in the correctness of security protocols and is considered an imperative step in their design. This paper presents a new theoretical concept, called Layered Proving Trees, for automatically applying logical postulates in logic-based security protocol verification. An algorithm for the new concept is introduced and the soundness and completeness of the technique is proved. Empirical results on the performance of the algorithm are presented. The presented proofs and empirical results demonstrate the feasibility and effectiveness of the Layered Proving Tree approach. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 10949224
- Volume :
- 8
- Issue :
- 3
- Database :
- Complementary Index
- Journal :
- ACM Transactions on Information & System Security (TISSEC)
- Publication Type :
- Academic Journal
- Accession number :
- 19032660
- Full Text :
- https://doi.org/10.1145/1085126.1085128