Lazy infinite-State analysis of security protocols

27Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security protocols are used to exchange information in a distributed system with the aim of providing security guarantees. We present an approach to modeling security protocols using lazy data types in a higher-order functional programming language. Our approach supports the formalization of protocol models in a natural and high-level way, and the automated analysis of safety properties using infinite-state model checking, where the model is explicitly constructed in a demand- driven manner. We illustrate these ideas with an extended example: modeling and checking the Needham-Schroeder public-key authentication protocol.

Cite

CITATION STYLE

APA

Basin, D. (1999). Lazy infinite-State analysis of security protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1740, pp. 30–42). Springer Verlag. https://doi.org/10.1007/3-540-46701-7_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free