Sciweavers

239 search results - page 10 / 48
» Approaches to Formal Verification of Security Protocols
Sort
View
WETICE
2005
IEEE
15 years 5 months ago
Application of Lightweight Formal Methods to Software Security
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
David P. Gilliam, John D. Powell, Matt Bishop
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
14 years 10 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
CCS
2006
ACM
15 years 3 months ago
An intruder model for verifying liveness in security protocols
We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equiv...
Jan Cederquist, Muhammad Torabi Dashti
ESORICS
2009
Springer
16 years 7 days ago
Secure Ownership and Ownership Transfer in RFID Systems
We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitio...
Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, Pi...
CCS
2008
ACM
15 years 1 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...