Modelling and verification of layered security protocols: A bank application

15Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Designing security-critical systems correctly is very difficult and there are many examples of weaknesses arising in practice. A particular challenge lies in the development of layered security protocols motivated by the need to combine existing or specifically designed protocols that each enforce a particular security requirement. Although appealing from a practical point of view, this approach raises the difficult question of the security properties guaranteed by the combined layered protocols, as opposed to each protocol in isolation. In this work, we apply a method for facilitating the development of trustworthy security-critical systems using the computer-aided systems engineering tool AUTOFOCUS to the particular problem of layered security protocols. We explain our method at the example of a banking application which is currently under development by a major German bank and is about to be put to commercial use. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Grünbauer, J., Hollmann, H., Jürjens, J., & Wimmel, G. (2003). Modelling and verification of layered security protocols: A bank application. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2788, 116–129. https://doi.org/10.1007/978-3-540-39878-3_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free