Sciweavers

ICFEM
2003
Springer

A Z Based Approach to Verifying Security Protocols

14 years 5 months ago
A Z Based Approach to Verifying Security Protocols
Abstract. Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism.
Benjamin W. Long, Colin J. Fidge, Antonio Cerone
Added 06 Jul 2010
Updated 06 Jul 2010
Type Conference
Year 2003
Where ICFEM
Authors Benjamin W. Long, Colin J. Fidge, Antonio Cerone
Comments (0)