Suitability of a classical analysis method for E-commerce protocols

0Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two models defer in both the threat scenario and in the formalization. We demonstrate the suitability of our adaptation by analyzing a specific version of the Internet Billing Server protocol introduced by Carnegie Mellon University. Our analysis shows that, while the security properties a key distribution or authentication protocol shall provide are well understood, it is often not clear what properties an electronic commerce protocol can or shall provide. Our methods rely on automatic theorem proving tools. Specifically, we used “Otter”, an automatic theorem proving software developed at Argonne National Laboratories.

Cite

CITATION STYLE

APA

Gürgens, S., & Lopez, J. (2001). Suitability of a classical analysis method for E-commerce protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2200, pp. 46–62). Springer Verlag. https://doi.org/10.1007/3-540-45439-x_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free