2003
DOI: 10.1007/978-3-540-39893-6_22
|View full text |Cite
|
Sign up to set email alerts
|

A Z Based Approach to Verifying Security Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2006
2006
2012
2012

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…Based on the informal description of the protocol in Section 3 and our previous work on modelling protocols [15,16], we now specify this protocol in Object-Z.…”
Section: Specifying the Protocol In Object-zmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the informal description of the protocol in Section 3 and our previous work on modelling protocols [15,16], we now specify this protocol in Object-Z.…”
Section: Specifying the Protocol In Object-zmentioning
confidence: 99%
“…Previously, we demonstrated the value of using the Z and Object-Z formal specification languages for verifying attacks on security protocols due to the expressive nature of these notations [15,16]. More recently, Smith and Wildman [25] showed how Z specifications can be analysed using the SAL model checker.…”
Section: Introductionmentioning
confidence: 99%
“…The InTransit state schema holds the value of the message currently in transit. This is sufficient to model a single instance of a protocol consisting of sequential steps [16]. …”
Section: Knowledge and Statementioning
confidence: 99%
“…Therefore, it would be convenient to provide a verification process for security protocols where analyses are carried out with respect to certain implementation assumptions that can be enforced in the overall development process. Attempts to apply formal verification to security protocols using formal state-based development methods such as Z [6,16], B [9], VDM, and Ina Jo [15] are rare and have not analysed protocols with complex message formats susceptible to implementation-dependent attacks. We have already demonstrated the value of a Z based approach for formal verification of security protocols [16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation