On BAN logics for industrial security protocols

被引:0
|
作者
Agray, N [1 ]
van der Hoek, W
de Vink, E
机构
[1] Univ Utrecht, Inst Informat & Comp Sci, Utrecht, Netherlands
[2] Univ Liverpool, Dept Comp Sci, Liverpool, Merseyside, England
[3] Tech Univ Eindhoven, Dept Comp Sci, NL-5600 MB Eindhoven, Netherlands
[4] Leiden Univ, Leiden Inst Adv Comp Sci, Leiden, Netherlands
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism is lacking, BAN logic provides an intuitive and powerful technique for security analysis.
引用
收藏
页码:29 / 36
页数:8
相关论文
共 50 条
  • [21] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394
  • [22] Verification of Security Protocols
    Cortier, Veronique
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13
  • [23] IP security protocols
    Bozoki, E
    DR DOBBS JOURNAL, 1999, 24 (12): : 42 - +
  • [24] Analysing security protocols
    Gollmann, D
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 71 - 80
  • [25] Incentives in Security Protocols
    Azouvi, Sarah
    Hicks, Alexander
    Murdoch, Steven J.
    SECURITY PROTOCOLS XXVI, 2018, 11286 : 132 - 141
  • [26] Internet security protocols
    Fumy, W
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 186 - 208
  • [27] Security protocols and their properties
    Abadi, M
    FOUNDATIONS OF SECURE COMPUTATION, 2000, 175 : 39 - 60
  • [28] RFID Security Protocols
    Daou, Hoda
    Kayssi, Ayman
    Chehab, Ali
    IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 233 - 237
  • [29] Multichannel security protocols
    Wong, Ford Long
    Stajano, Rank
    IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 31 - 39
  • [30] Security protocols and performance
    deCarmo, L
    DR DOBBS JOURNAL, 2000, 25 (11): : 40 - +