메뉴 건너뛰기




Volumn 206, Issue 2-4, 2008, Pages 425-459

A framework for compositional verification of security protocols

Author keywords

Authentication; Automatic verification; Compositionality; Confidentiality; Security properties; Security protocols; Semantics; WiMAX

Indexed keywords

AUTHENTICATION; COMPUTATIONAL COMPLEXITY; MULTI AGENT SYSTEMS; SEMANTICS; STRUCTURED PROGRAMMING; VERIFICATION;

EID: 40149109757     PISSN: 08905401     EISSN: 10902651     Source Type: Journal    
DOI: 10.1016/j.ic.2007.07.002     Document Type: Article
Times cited : (43)

References (44)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: the spi calculus
    • Abadi M., and Gordon A.D. A calculus for cryptographic protocols: the spi calculus. Inf. Comput. 1 148 (1999) 1-70
    • (1999) Inf. Comput. , vol.1 , Issue.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 40149096932 scopus 로고    scopus 로고
    • J. Alves-Foss, Provably insecure mutual authentication protocols: the two-party symmetric encryption case, in: Proceedings of National Information System Security Conference, October 1999, pp. 306-314.
    • J. Alves-Foss, Provably insecure mutual authentication protocols: the two-party symmetric encryption case, in: Proceedings of National Information System Security Conference, October 1999, pp. 306-314.
  • 3
    • 40149099690 scopus 로고    scopus 로고
    • Proving authentication properties in the Protocol Derivation Assistant
    • Degano P., Küsters R., and Vigano L. (Eds), ACM
    • Anlauff M., Pavlovic D., Waldinger R., and Westfold S. Proving authentication properties in the Protocol Derivation Assistant. In: Degano P., Küsters R., and Vigano L. (Eds). Proceedings of FCS-ARSPA 2006 (2006), ACM
    • (2006) Proceedings of FCS-ARSPA 2006
    • Anlauff, M.1    Pavlovic, D.2    Waldinger, R.3    Westfold, S.4
  • 6
    • 35248843428 scopus 로고    scopus 로고
    • On compositional reasoning in the spi-calculus
    • Proceedings of Fifth International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'02). Nielsen M., and Engberg U. (Eds), Springer
    • Boreale M., and Gorla D. On compositional reasoning in the spi-calculus. In: Nielsen M., and Engberg U. (Eds). Proceedings of Fifth International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'02). LNCS vol. 2303 (2002), Springer 67-81
    • (2002) LNCS , vol.2303 , pp. 67-81
    • Boreale, M.1    Gorla, D.2
  • 7
    • 20444443229 scopus 로고    scopus 로고
    • M. Bugliesi, R. Focardi, M. Maffei, Authenticity by tagging and typing, in: FMSE '04: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, ACM Press, New York, NY, USA, 2004, pp. 1-12.
    • M. Bugliesi, R. Focardi, M. Maffei, Authenticity by tagging and typing, in: FMSE '04: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, ACM Press, New York, NY, USA, 2004, pp. 1-12.
  • 8
    • 21144444143 scopus 로고    scopus 로고
    • Compositional analysis of authentication protocols
    • Proceedings of the 13th European Symposium on Programming (ESOP). Schmidt D.A. (Ed), Springer
    • Bugliesi M., Focardi R., and Maffei M. Compositional analysis of authentication protocols. In: Schmidt D.A. (Ed). Proceedings of the 13th European Symposium on Programming (ESOP). Lecture Notes in Computer Science vol. 2986 (2004), Springer 140-154
    • (2004) Lecture Notes in Computer Science , vol.2986 , pp. 140-154
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 9
    • 40149109132 scopus 로고    scopus 로고
    • M. Burrows, M. Abadi, R. Needham, A logic of authentication, in: Practical Cryptography for Data Internetworks, IEEE Computer Society Press, 1996. Reprinted from the Proceedings of the Royal Society, vol. 426, No. 1871, 1989.
    • M. Burrows, M. Abadi, R. Needham, A logic of authentication, in: Practical Cryptography for Data Internetworks, IEEE Computer Society Press, 1996. Reprinted from the Proceedings of the Royal Society, vol. 426, No. 1871, 1989.
  • 10
    • 2642523732 scopus 로고    scopus 로고
    • Environmental requirements for authentication protocols
    • Software Security-Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002. Okada M., Pierce B.C., Scedrov A., Tokuda H., and Yonezawa A. (Eds), Springer, Tokyo, Japan
    • Canetti R., Meadows C., and Syverson P. Environmental requirements for authentication protocols. In: Okada M., Pierce B.C., Scedrov A., Tokuda H., and Yonezawa A. (Eds). Software Security-Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002. Lecture Notes in Computer Science vol. 2609 (2002), Springer, Tokyo, Japan 339-355
    • (2002) Lecture Notes in Computer Science , vol.2609 , pp. 339-355
    • Canetti, R.1    Meadows, C.2    Syverson, P.3
  • 11
    • 40149098018 scopus 로고    scopus 로고
    • C.J.F. Cremers, Scyther: automatic verification of security protocols. Available from: .
    • C.J.F. Cremers, Scyther: automatic verification of security protocols. Available from: .
  • 12
    • 29244485874 scopus 로고    scopus 로고
    • C.J.F. Cremers, Compositionality of security protocols: a research agenda, in: F. Gadducci, M. ter Beek (Eds.), VODCA 2004, ENTCS, vol. 142(3), Bertinoro, Italy, 2006, pp. 99-110.
    • C.J.F. Cremers, Compositionality of security protocols: a research agenda, in: F. Gadducci, M. ter Beek (Eds.), VODCA 2004, ENTCS, vol. 142(3), Bertinoro, Italy, 2006, pp. 99-110.
  • 13
    • 33750936222 scopus 로고    scopus 로고
    • C.J.F. Cremers, Feasibility of multi-protocol attacks, in: Proceedings of the First International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, Vienna, Austria, April 2006, pp. 287-294.
    • C.J.F. Cremers, Feasibility of multi-protocol attacks, in: Proceedings of the First International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, Vienna, Austria, April 2006, pp. 287-294.
  • 14
    • 40149088402 scopus 로고    scopus 로고
    • C.J.F. Cremers, Scyther-Semantics and Verification of Security Protocols, PhD Thesis, Eindhoven University of Technology, 2006, ISBN 90-386-0804-7. ISBN 978-90-386-0804-4.
    • C.J.F. Cremers, Scyther-Semantics and Verification of Security Protocols, PhD Thesis, Eindhoven University of Technology, 2006, ISBN 90-386-0804-7. ISBN 978-90-386-0804-4.
  • 15
    • 24944514681 scopus 로고    scopus 로고
    • C.J.F. Cremers, S. Mauw, Operational semantics of security protocols, in: S. Leue, T.J. Systä (Eds.), Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 post-seminar proceedings, September 7-12, 2003), Lecture Notes in Computer Science, vol. 3466, 2005, pp. 66-89.
    • C.J.F. Cremers, S. Mauw, Operational semantics of security protocols, in: S. Leue, T.J. Systä (Eds.), Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 post-seminar proceedings, September 7-12, 2003), Lecture Notes in Computer Science, vol. 3466, 2005, pp. 66-89.
  • 16
    • 33750487822 scopus 로고    scopus 로고
    • C.J.F. Cremers, S. Mauw, E.P. de Vink, Injective synchronisation: an extension of the authentication hierarchy, Theor. Comput. Sci. 367(1-2) (2006) 139-161, in: P. Degano, L. Vigano (Eds.), Special issue on ARSPA'05.
    • C.J.F. Cremers, S. Mauw, E.P. de Vink, Injective synchronisation: an extension of the authentication hierarchy, Theor. Comput. Sci. 367(1-2) (2006) 139-161, in: P. Degano, L. Vigano (Eds.), Special issue on ARSPA'05.
  • 18
    • 2642548302 scopus 로고    scopus 로고
    • A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, Secure protocol composition, in: FMSE '03: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, ACM Press, New York, NY, USA, 2003, pp. 11-23.
    • A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, Secure protocol composition, in: FMSE '03: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, ACM Press, New York, NY, USA, 2003, pp. 11-23.
  • 19
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev D., and Yao A.C. On the security of public key protocols. IEEE Trans. Inf. Theory IT-29 12 (1983) 198-208
    • (1983) IEEE Trans. Inf. Theory , vol.IT-29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 20
    • 84958771675 scopus 로고    scopus 로고
    • R. Focardi, R. Gorrieri, Automatic compositional verification of some security properties, Lecture Notes in Computer Science, vol. 1055, 1996, pp. 166-186.
    • R. Focardi, R. Gorrieri, Automatic compositional verification of some security properties, Lecture Notes in Computer Science, vol. 1055, 1996, pp. 166-186.
  • 21
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: a tool for the verification of information flow security properties
    • Focardi R., and Gorrieri R. The compositional security checker: a tool for the verification of information flow security properties. IEEE Trans. Softw. Eng. 23 9 (1997) 550-571
    • (1997) IEEE Trans. Softw. Eng. , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 22
    • 0033714403 scopus 로고    scopus 로고
    • J.D. Guttman, F.J. Thayer, Protocol independence through disjoint encryption, in: PCSFW: Proceedings of the 13th Computer Security Foundations Workshop, IEEE Computer Society Press, 2000. Available from: .
    • J.D. Guttman, F.J. Thayer, Protocol independence through disjoint encryption, in: PCSFW: Proceedings of the 13th Computer Security Foundations Workshop, IEEE Computer Society Press, 2000. Available from: .
  • 23
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • Guttman J.D., and Thayer F.J. Authentication tests and the structure of bundles. Theor. Comput. Sci. 283 2 (2001) 333-380
    • (2001) Theor. Comput. Sci. , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Thayer, F.J.2
  • 25
    • 0001924088 scopus 로고    scopus 로고
    • A model for secure protocols and their compositions
    • Heintze N., and Tygar J.D. A model for secure protocols and their compositions. IEEE Trans. Softw. Eng. 22 1 (1996) 16-30
    • (1996) IEEE Trans. Softw. Eng. , vol.22 , Issue.1 , pp. 16-30
    • Heintze, N.1    Tygar, J.D.2
  • 26
    • 40149093053 scopus 로고    scopus 로고
    • IEEE, standard 802.16-2004, 2004.
    • IEEE, standard 802.16-2004, 2004.
  • 27
    • 40149083044 scopus 로고    scopus 로고
    • IEEE, standard 802.16e-2005, 2005.
    • IEEE, standard 802.16e-2005, 2005.
  • 28
    • 3042685819 scopus 로고    scopus 로고
    • Overview of IEEE 802.16 security
    • Johnston D., and Walker J. Overview of IEEE 802.16 security. IEEE Security Privacy 2 3 (2004) 40-48
    • (2004) IEEE Security Privacy , vol.2 , Issue.3 , pp. 40-48
    • Johnston, D.1    Walker, J.2
  • 29
    • 84955617577 scopus 로고    scopus 로고
    • J. Jürjens, Composability of secrecy, in: V. Gorodetski, V. Skormin, L. Popyack (Eds.), International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2001), Lecture Notes in Computer Science, vol. 2052. Springer, St. Petersburg, May 2001, pp. 28-38.
    • J. Jürjens, Composability of secrecy, in: V. Gorodetski, V. Skormin, L. Popyack (Eds.), International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2001), Lecture Notes in Computer Science, vol. 2052. Springer, St. Petersburg, May 2001, pp. 28-38.
  • 30
    • 40149094724 scopus 로고    scopus 로고
    • E. Kaasenbrood, WiMAX security-a formal and informal analysis, Master's project, Eindhoven University of Technology, Department of Mathematics and Computer Science, 2006.
    • E. Kaasenbrood, WiMAX security-a formal and informal analysis, Master's project, Eindhoven University of Technology, Department of Mathematics and Computer Science, 2006.
  • 31
    • 84956985093 scopus 로고    scopus 로고
    • Protocol interactions and the chosen protocol attack
    • Proceedings of the Fifth International Workshop on Security Protocols. Christianson B., Crispo B., Lomas T.M.A., and Roe M. (Eds), Springer, London, UK
    • Kelsey J., Schneier B., and Wagner D. Protocol interactions and the chosen protocol attack. In: Christianson B., Crispo B., Lomas T.M.A., and Roe M. (Eds). Proceedings of the Fifth International Workshop on Security Protocols. Lecture Notes in Computer Science vol. 1361 (1998), Springer, London, UK 91-104
    • (1998) Lecture Notes in Computer Science , vol.1361 , pp. 91-104
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 32
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceedings of TACAS, Springer
    • Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Proceedings of TACAS. Lecture Notes in Computer Science vol. 1055 (1996), Springer 147-166
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 33
    • 18444385411 scopus 로고    scopus 로고
    • M. Maffei, Tags for multi-protocol authentication, in: Proceedings of the Second International Workshop on Security Issues in Coordination Models, Languages, and Systems, Electronic Notes in Theoretical Computer Science, vol. 128(5), Elsevier ScienceDirect, August 2005, pp. 55-63.
    • M. Maffei, Tags for multi-protocol authentication, in: Proceedings of the Second International Workshop on Security Issues in Coordination Models, Languages, and Systems, Electronic Notes in Theoretical Computer Science, vol. 128(5), Elsevier ScienceDirect, August 2005, pp. 55-63.
  • 35
    • 0032630725 scopus 로고    scopus 로고
    • Analysis of the internet key exchange protocol using the NRL protocol analyzer
    • IEEE Computer Society
    • Meadows C. Analysis of the internet key exchange protocol using the NRL protocol analyzer. Proceedings of the 20th IEEE Symposium on Security & Privacy (1999), IEEE Computer Society 216-231
    • (1999) Proceedings of the 20th IEEE Symposium on Security & Privacy , pp. 216-231
    • Meadows, C.1
  • 36
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • IEEE Computer Society Press
    • Meadows C. Open issues in formal methods for cryptographic protocol analysis. Proceedings of DISCEX 2004 (2000), IEEE Computer Society Press 237-250
    • (2000) Proceedings of DISCEX 2004 , pp. 237-250
    • Meadows, C.1
  • 37
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Commun. ACM 21 2 (1978) 120-126
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Needham, R.1    Schroeder, M.2
  • 38
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Comput. Secur. 6 1-2 (1998) 85-128
    • (1998) J. Comput. Secur. , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 40
    • 40149104775 scopus 로고    scopus 로고
    • O. Sheyner, J. Wing, Composing proofs of security protocols using Isabelle/IOA, August 2000, in: Proceedings of the Theorem Proving for Higher Order Logics (TPHOLs) Workshop, Short Paper.
    • O. Sheyner, J. Wing, Composing proofs of security protocols using Isabelle/IOA, August 2000, in: Proceedings of the Theorem Proving for Higher Order Logics (TPHOLs) Workshop, Short Paper.
  • 41
    • 85176677157 scopus 로고    scopus 로고
    • F.J. Thayer, J.C. Herzog, J.D. Guttman, Strand spaces: why is a security protocol correct?, in: Proceedings of 1998 IEEE Symposium on Security and Privacy, Oakland, CA, 1998, pp. 66-77.
    • F.J. Thayer, J.C. Herzog, J.D. Guttman, Strand spaces: why is a security protocol correct?, in: Proceedings of 1998 IEEE Symposium on Security and Privacy, Oakland, CA, 1998, pp. 66-77.
  • 43
    • 47249121362 scopus 로고    scopus 로고
    • S. Xu, C.-T. Huang, Attacks on PKM protocols of IEEE 802.16 and its later versions, in: Proceedings of Third International Symposium on Wireless Communication Systems (ISWCS 2006), Valencia, Spain, 2006.
    • S. Xu, C.-T. Huang, Attacks on PKM protocols of IEEE 802.16 and its later versions, in: Proceedings of Third International Symposium on Wireless Communication Systems (ISWCS 2006), Valencia, Spain, 2006.
  • 44
    • 34248381676 scopus 로고    scopus 로고
    • S. Xu, M.M. Matthews, C.-T. Huang, Security issues in privacy and key management protocols of IEEE 802.16, in: Proceedings of the 44th ACM Southeast Conference (ACMSE 2006), Melbourne, FL, USA, 2006.
    • S. Xu, M.M. Matthews, C.-T. Huang, Security issues in privacy and key management protocols of IEEE 802.16, in: Proceedings of the 44th ACM Southeast Conference (ACMSE 2006), Melbourne, FL, USA, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.