Detail publikace

The Use of Modal Logics in the Security Protocols Analysis

Originální název

The Use of Modal Logics in the Security Protocols Analysis

Anglický název

The Use of Modal Logics in the Security Protocols Analysis

Jazyk

en

Originální abstrakt

Traditionally, security protocols have been designed and verified using various techniques. Formal logics have been used to identify a number of flaws in protocols previously considered to be secure. The selection of proper modal logic is a crucial goal in the protocol analysis process. This paper gives a comparative study of modal logics, which are widely used in modeling of security protocols.

Anglický abstrakt

Traditionally, security protocols have been designed and verified using various techniques. Formal logics have been used to identify a number of flaws in protocols previously considered to be secure. The selection of proper modal logic is a crucial goal in the protocol analysis process. This paper gives a comparative study of modal logics, which are widely used in modeling of security protocols.

BibTex


@inproceedings{BUT22192,
  author="Pavel {Očenášek} and Roman {Trchalík}",
  title="The Use of Modal Logics in the Security Protocols Analysis",
  annote="Traditionally, security protocols have been designed and verified using various
techniques. Formal logics have been used to identify a number of flaws in
protocols previously considered to be secure. The selection of proper modal logic
is a crucial goal in the protocol analysis process. This paper gives a
comparative study of modal logics, which are widely used in modeling of security
protocols.",
  address="Faculty of Electrical Engineering and Communication BUT",
  booktitle="Proceedings of the 12th Conference STUDENT EEICT 2006",
  chapter="22192",
  institution="Faculty of Electrical Engineering and Communication BUT",
  year="2006",
  month="april",
  pages="395--399",
  publisher="Faculty of Electrical Engineering and Communication BUT",
  type="conference paper"
}