@giuliano.losa

Secure protocol composition

, , , und . Proceedings of the 2003 ACM workshop on Formal methods in security engineering, Seite 11--23. New York, NY, USA, ACM, (2003)
DOI: 10.1145/1035429.1035431

Zusammenfassung

Modular composition of security mechanisms is complicated by the way that one mechanism may reveal information that interferes with the security of another. We develop methods for modular reasoning about security protocols, using before-after assertions and protocol invariants. The before-after assertions allow us to prove properties of a sequential composition of protocol steps and therefore enable construction of complex protocols from smaller sub-protocols. Invariants provide a mechanism for ensuring that sub-protocols which are individually secure do not interact insecurely when they are composed to construct a bigger protocol. The application of the method is demonstrated by giving modular formal proofs involving two standard protocols.

Beschreibung

Secure protocol composition

Links und Ressourcen

Tags

Community

  • @giuliano.losa
  • @dblp
@giuliano.losas Tags hervorgehoben