Rule-based dependency models for security protocol analysis

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Show simple item record

dc.contributor.author Chen, Q
dc.contributor.author Zhang, S
dc.contributor.author Chen, Y-PP
dc.date.accessioned 2010-05-28T09:47:30Z
dc.date.issued 2008
dc.identifier.citation Integrated Computer-Aided Engineering, 2008, 15 (4), pp. 369 - 380
dc.identifier.issn 1069-2509
dc.identifier.other C1 en_US
dc.identifier.uri http://hdl.handle.net/10453/9115
dc.description.abstract Security protocol analysis has been discussed for quite some time in the past few years. Although formal methods have been widely used to identify various vulnerabilities, mainly susceptibility to freshness attacks and impersonation, the arisen inconsistent data between principals and collusion attacks held by a group of dishonest principals have been largely ignored. Moreover, the previous methods focus on reasoning about certain security-related properties and detecting known attacks against secure message, whereas there have been insufficient efforts to handle the above hidden but powerful attacks. In this paper, we address these critical issues and prove the efficiency and intuitiveness of rule-based dependency models in defending a protocol against the attacks. This is able to provide a numerical estimation to measure he occurrence of these attacks. It will be useful in enhancing the current protocol analysis. © 2008 - IOS Press.
dc.language eng
dc.title Rule-based dependency models for security protocol analysis
dc.type Journal Article
dc.parent Integrated Computer-Aided Engineering
dc.journal.volume 4
dc.journal.volume 15
dc.journal.number 4 en_US
dc.publocation USA en_US
dc.identifier.startpage 369 en_US
dc.identifier.endpage 380 en_US
dc.cauo.name QCIS Investment Associate en_US
dc.conference Verified OK en_US
dc.for 0803 Computer Software
dc.for 0801 Artificial Intelligence and Image Processing
dc.personcode 020030
dc.personcode 117449
dc.percentage 50 en_US
dc.classification.name Computer Software en_US
dc.classification.type FOR-08 en_US
dc.edition en_US
dc.custom en_US
dc.date.activity en_US
dc.location.activity en_US
dc.description.keywords Security protocol analysis, Traditional formal methods, rule-based dependency models, certain security-related properties. en_US
pubs.embargo.period Not known
pubs.organisational-group /University of Technology Sydney
pubs.organisational-group /University of Technology Sydney/Faculty of Engineering and Information Technology
pubs.organisational-group /University of Technology Sydney/Strength - Quantum Computation and Intelligent Systems
utslib.copyright.status Closed Access
utslib.copyright.date 2015-04-15 12:17:09.805752+10


Files in this item

This item appears in the following Collection(s)

Show simple item record