Automated analysis of infinite scenarios

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The security of a network protocol crucially relies on the scenario in which the protocol is deployed. This paper describes syntactic constructs for modelling network scenarios and presents an automated analysis tool, which can guarantee that security properties hold in all of the (infinitely many) instances of a scenario. The tool is based on control flow analysis of the process calculus LySa and is applied to the Bauer, Berson, and Feiertag protocol where is reveals a previously undocumented problem, which occurs in some scenarios but not in other. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Buchholtz, M. (2005). Automated analysis of infinite scenarios. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3705 LNCS, pp. 334–352). https://doi.org/10.1007/11580850_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free