Formal Correctness of Security Protocols (Electronic book text)


Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis, the Inductive Method in the theorem prover Isabelle, turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.This book will benefit researchers and graduate students in the fields of formal methods, information security, inductive methods, and networking.

Delivery AdviceNot available

Toggle WishListAdd to wish list
Review this Item

Product Description

Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis, the Inductive Method in the theorem prover Isabelle, turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.This book will benefit researchers and graduate students in the fields of formal methods, information security, inductive methods, and networking.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Springer

Country of origin

United States

Series

Information Security and Cryptography: Texts and Monographs

Release date

2010

Availability

We don't currently have any sources for this product. If you add this item to your wish list we will let you know when it becomes available.

Authors

Format

Electronic book text

Pages

274

ISBN-13

978-1-280-86432-2

Barcode

9781280864322

Categories

LSN

1-280-86432-X



Trending On Loot