Inicio > > Programación informática/desarrollo de software > Operational Semantics and Verification of Security Protocols
Operational Semantics and Verification of Security Protocols

Operational Semantics and Verification of Security Protocols

Cas Cremers / Sjouke Mauw

83,88 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2012
Materia
Programación informática/desarrollo de software
ISBN:
9783540786351
83,88 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.The methodology’s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

Artículos relacionados

  • SPARK 2014 Reference Manual
    AdaCore / Altran UK Ltd
    SPARK 2014 is a programming language and a set of verification tools designed to meet the needs of high-assurance software development. SPARK 2014 is based on Ada 2012, both subsetting the language to remove features that defy verification, but also extending the system of contracts and aspects to support modular, formal verification.This manual is available online for free at ...
    Disponible

    19,91 €

  • Software and Intelligent Sciences
    Yingxu Wang
    The junction of software development and engineering combined with the study of intelligence has created a bustling intersection of theory, design, engineering, and conceptual thought. Software and Intelligent Sciences: New Transdisciplinary Findings sits at a crossroads and informs advanced researchers, students, and practitioners on the developments in computer science, theor...
    Disponible

    256,77 €

  • Power System Planning Technologies and Applications
    Fawwaz Elkarmi / Nazih Abu Shikhah / Nazih Abu-Shikhah
    Planning is an important function of the management of any business, providing knowledge of future prospects and enabling prudent and appropriate decision-making. Planning is especially critical for power systems, since electricity is a fundamental part of modern societies and many conventional electrical energy resources currently in use are limited. Power System Planning Tech...
    Disponible

    255,75 €

  • Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery
    Masha Etkind / Uri Shafrir
    Text analysis tools aid in extracting meaning from digital content. As digital text becomes more and more complex, new techniques are needed to understand conceptual structure. Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery: Emerging Research and Opportunities provides an innovative perspective on the application of algorithmic tools to study unstructured d...
    Disponible

    170,34 €

  • Model-Based Design for Effective Control System Development
    Wei Wu
    Control systems are an integral aspect of modern society and exist across numerous domains and applications. As technology advances more and more, the complexity of such systems continues to increase exponentially. Model-Based Design for Effective Control System Development is a critical source of scholarly information on model-centric approaches and implementations for control...
    Disponible

    242,72 €

  • Verification, Validation and Testing in Software Engineering
    ...
    Disponible

    125,53 €