Back to Search Start Over

The Concept of Layered Proving Trees and Its Application to the Automation of Security Protocol Verification.

Authors :
Dojen, Reiner
Coffey, Tom
Source :
ACM Transactions on Information & System Security (TISSEC); Aug2005, Vol. 8 Issue 3, p287-311, 25p, 3 Diagrams, 2 Charts
Publication Year :
2005

Abstract

Security protocols are one of the most critical elements in enabling the secure communication and processing of information. The presence of flaws in published protocols highlights the complexity of security protocol design. Only formal verification can provide strong confidence in the correctness of security protocols and is considered an imperative step in their design. This paper presents a new theoretical concept, called Layered Proving Trees, for automatically applying logical postulates in logic-based security protocol verification. An algorithm for the new concept is introduced and the soundness and completeness of the technique is proved. Empirical results on the performance of the algorithm are presented. The presented proofs and empirical results demonstrate the feasibility and effectiveness of the Layered Proving Tree approach. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
10949224
Volume :
8
Issue :
3
Database :
Complementary Index
Journal :
ACM Transactions on Information & System Security (TISSEC)
Publication Type :
Academic Journal
Accession number :
19032660
Full Text :
https://doi.org/10.1145/1085126.1085128