Publication detail

Evolutionary Approach in the Security Protocols Design

OČENÁŠEK, P.

Original Title

Evolutionary Approach in the Security Protocols Design

English Title

Evolutionary Approach in the Security Protocols Design

Type

conference paper

Language

en

Original Abstract

This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the specification of modal logic that is used to encode the belief and knowledge of communicating parties. The second part introduces the evolutionary optimization framework and proposes the techniques that can be used to automatically evolve basic security protocols.

English abstract

This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the specification of modal logic that is used to encode the belief and knowledge of communicating parties. The second part introduces the evolutionary optimization framework and proposes the techniques that can be used to automatically evolve basic security protocols.

Keywords

Security protocol, design, verification, modal logic, genetic algorithm, evolution, chromosome, crossover, state space exploring

RIV year

2005

Released

15.12.2005

Publisher

Springer Verlag

Location

University of Glamorgan

ISBN

1-84628-311-6

Book

Proceedings of the First European Conference on Computer Network Defence

Pages from

147

Pages to

156

Pages count

10

URL

BibTex


@inproceedings{BUT18276,
  author="Pavel {Očenášek}",
  title="Evolutionary Approach in the Security Protocols Design",
  annote="This paper proposes an evolutionary method that serves for designing
security protocols. The principles of security protocols are outlined,
followed by the specification of modal logic that is used to encode the
belief and knowledge of communicating parties. The second part
introduces the evolutionary optimization framework and proposes the
techniques that can be used to automatically evolve basic security
protocols.",
  address="Springer Verlag",
  booktitle="Proceedings of the First European Conference on Computer Network Defence",
  chapter="18276",
  institution="Springer Verlag",
  year="2005",
  month="december",
  pages="147--156",
  publisher="Springer Verlag",
  type="conference paper"
}