Detail publikace

Towards Selected Problems in the Security Protocol Design and Verification

Originální název

Towards Selected Problems in the Security Protocol Design and Verification

Anglický název

Towards Selected Problems in the Security Protocol Design and Verification

Jazyk

en

Originální abstrakt

This paper overviews the area of design and verification of security protocols and focuses on selected issues. Most frequently used verification approaches as well as some supplementary tools that could be used to evaluate the quality of protocols and to find the security flaws are summarized. In conjunction with the discussed issues a brief description and state of the art of the design process is given, followed by an introduction to the author's presented evolutionary approach, which seems to be useful for automating the protocol design. Unlike the former publications from this area, this paper provides a global view of the problem - the process of protocol design and the verification in general.

Anglický abstrakt

This paper overviews the area of design and verification of security protocols and focuses on selected issues. Most frequently used verification approaches as well as some supplementary tools that could be used to evaluate the quality of protocols and to find the security flaws are summarized. In conjunction with the discussed issues a brief description and state of the art of the design process is given, followed by an introduction to the author's presented evolutionary approach, which seems to be useful for automating the protocol design. Unlike the former publications from this area, this paper provides a global view of the problem - the process of protocol design and the verification in general.

BibTex


@inproceedings{BUT18068,
  author="Pavel {Očenášek}",
  title="Towards Selected Problems in the Security Protocol Design and Verification",
  annote="This paper overviews the area of design and verification of security protocols and focuses on selected issues. Most frequently used verification approaches as well as some supplementary tools that could be used to evaluate the quality of protocols and to find the security flaws are summarized. In conjunction with the discussed issues a brief description and state of the art of the design process is given, followed by an introduction to the author's presented evolutionary approach, which seems to be useful for automating the protocol design. Unlike the former publications from this area, this paper provides a global view of the problem - the process of protocol design and the verification in general.",
  address="Faculty of Informatics MU",
  booktitle="Pre-Proceedings of the 1st Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS 2005)",
  chapter="18068",
  institution="Faculty of Informatics MU",
  year="2005",
  month="september",
  pages="1",
  publisher="Faculty of Informatics MU",
  type="conference paper"
}