Modeling and analyzing security protocols in SAM: A case study Conference

Dai, Z, He, X, Ding, J et al. (2004). Modeling and analyzing security protocols in SAM: A case study . 115-121.

cited authors

  • Dai, Z; He, X; Ding, J; Gao, S

authors

abstract

  • Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use SAM, a dual formalism based on Petri nets and temporal logic, to provide a systematic approach to specify and analyze security protocols and their desired properties. We illustrate our approach through a case study.

publication date

  • December 1, 2004

International Standard Book Number (ISBN) 10

International Standard Book Number (ISBN) 13

start page

  • 115

end page

  • 121