|
Trudy SPIIRAN, 2009, Issue 8, Pages 292–310
(Mi trspy14)
|
|
|
|
Security protocols verification combining existing approaches and tools
I. V. Kotenko, S. A. Reznik, A. V. Shorov St. Petersburg Institute for Informatics and Automation of RAS
Abstract:
This paper evaluates existing approaches to the security protocols verification and explains why it is impossible to thoroughly verify security protocols using only one of them. To solve this problem combined verification approach which is based on the assembly of strong sides specific for different existing approaches and tools is suggested.
Keywords:
security protocols, formal methods, verification, model checking, theorem proving.
Citation:
I. V. Kotenko, S. A. Reznik, A. V. Shorov, “Security protocols verification combining existing approaches and tools”, Tr. SPIIRAN, 8 (2009), 292–310
Linking options:
https://www.mathnet.ru/eng/trspy14 https://www.mathnet.ru/eng/trspy/v8/p292
|
|