Publication detail

Towards Selected Problems in the Security Protocol Design and Verification

OČENÁŠEK, P.

Original Title

Towards Selected Problems in the Security Protocol Design and Verification

English Title

Towards Selected Problems in the Security Protocol Design and Verification

Type

conference paper

Language

en

Original Abstract

This paper overviews the area of design and verification of security protocols and focuses on selected issues. Most frequently used verification approaches as well as some supplementary tools that could be used to evaluate the quality of protocols and to find the security flaws are summarized. In conjunction with the discussed issues a brief description and state of the art of the design process is given, followed by an introduction to the author's presented evolutionary approach, which seems to be useful for automating the protocol design. Unlike the former publications from this area, this paper provides a global view of the problem - the process of protocol design and the verification in general.

English abstract

This paper overviews the area of design and verification of security protocols and focuses on selected issues. Most frequently used verification approaches as well as some supplementary tools that could be used to evaluate the quality of protocols and to find the security flaws are summarized. In conjunction with the discussed issues a brief description and state of the art of the design process is given, followed by an introduction to the author's presented evolutionary approach, which seems to be useful for automating the protocol design. Unlike the former publications from this area, this paper provides a global view of the problem - the process of protocol design and the verification in general.

Keywords

security protocol, design, verification

RIV year

2005

Released

24.09.2005

Publisher

Faculty of Informatics MU

Location

Brno

Pages from

1

Pages to

9

Pages count

9

URL

BibTex


@inproceedings{BUT18068,
  author="Pavel {Očenášek}",
  title="Towards Selected Problems in the Security Protocol Design and Verification",
  annote="This paper overviews the area of design and verification of security protocols and focuses on selected issues. Most frequently used verification approaches as well as some supplementary tools that could be used to evaluate the quality of protocols and to find the security flaws are summarized. In conjunction with the discussed issues a brief description and state of the art of the design process is given, followed by an introduction to the author's presented evolutionary approach, which seems to be useful for automating the protocol design. Unlike the former publications from this area, this paper provides a global view of the problem - the process of protocol design and the verification in general.",
  address="Faculty of Informatics MU",
  booktitle="Pre-Proceedings of the 1st Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS 2005)",
  chapter="18068",
  institution="Faculty of Informatics MU",
  year="2005",
  month="september",
  pages="1",
  publisher="Faculty of Informatics MU",
  type="conference paper"
}