The Resource Operational semantics and verification of security protocols, Cas Cremers, Sjouke Mauw, (electronic resource)

Operational semantics and verification of security protocols, Cas Cremers, Sjouke Mauw, (electronic resource)

Label
Operational semantics and verification of security protocols
Title
Operational semantics and verification of security protocols
Statement of responsibility
Cas Cremers, Sjouke Mauw
Creator
Contributor
Provider
Subject
Genre
Language
eng
Summary
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool. The methodology’s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols
Member of
Cataloging source
GW5XE
http://library.link/vocab/creatorName
Cremers, Cas
Image bit depth
0
LC call number
QA76.9.A25
LC item number
C74 2012
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • SpringerLink
  • Mauw, S
Series statement
Information Security and Cryptography,
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
  • Semantic computing
  • Computer networks
  • Computer security
  • Semantic computing
  • Informatique
Label
Operational semantics and verification of security protocols, Cas Cremers, Sjouke Mauw, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Bibliography note
Includes bibliographical reference and index
Color
not applicable
Contents
Introduction -- Preliminaries -- Operational Semantics -- Security Properties -- Verification -- Multiprotocol Attacks -- Generalizing NSL for Multiparty Authentication -- Related Work -- Conclusions and Future Work -- Index
Dimensions
unknown
Extent
1 online resource.
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783540786368
Level of compression
uncompressed
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)817913303
  • (OCoLC)ocn817913303
Label
Operational semantics and verification of security protocols, Cas Cremers, Sjouke Mauw, (electronic resource)
Publication
Antecedent source
mixed
Bibliography note
Includes bibliographical reference and index
Color
not applicable
Contents
Introduction -- Preliminaries -- Operational Semantics -- Security Properties -- Verification -- Multiprotocol Attacks -- Generalizing NSL for Multiparty Authentication -- Related Work -- Conclusions and Future Work -- Index
Dimensions
unknown
Extent
1 online resource.
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783540786368
Level of compression
uncompressed
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)817913303
  • (OCoLC)ocn817913303

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...