Proof-Based Design of Security Protocols

被引:0
作者
Benaissa, Nazim [1 ]
Mery, Dominique [1 ]
机构
[1] Univ Nancy 1, LORIA, F-54506 Vandoeuvre Les Nancy, France
来源
COMPUTER SCIENCE - THEORY AND APPLICATIONS | 2010年 / 6072卷
关键词
AUTHENTICATION; REFINEMENT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the refinement-based process for the development of security protocols. Our approach is based on the Event B refinement, which makes proofs easier and which makes the design process faithfull to the structure of the protocol as the designer thinks of it. We introduce the notion of mechanism related to a given security property; a mechanism can be combined with another mechanism through the double refinement process ensuring the preservation of previous security properties of mechanisms. Mechanisms and combination of mechanisms are based on EVENT B models related to the security property of the current mechanism. Analysing cryptographic protocols requires precise modelling of the attacker's knowledge and the attacker's behaviour conforms to the Dolev-Yao model.
引用
收藏
页码:25 / 36
页数:12
相关论文
共 19 条
[1]  
Abrial JR, 2007, FUND INFORM, V77, P1
[2]  
ABRIAL JR, 2009, MODELING EV IN PRESS
[3]  
[Anonymous], 1997, DESIGN PATTERNS ELEM
[4]  
[Anonymous], 1998, LNCS
[5]  
[Anonymous], 1996, LNCS
[6]  
Benaïssa N, 2008, LECT NOTES COMPUT SC, V5238, P251
[7]  
CANSELL D, 2007, EVENT B MODELLING ME, P33
[8]   Refinement: A Constructive Approach to Formal Software Design for a Secure e-voting Interface [J].
Cansell, Dominique ;
Gibson, J. Paul ;
Mery, Dominique .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 183 (SPEC. ISS.) :39-55
[9]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[10]  
ISO, 1996, 117702 ISOIEC