Process calculi and the verification of security protocols

Authors

  • Michele Boreale
  • Daniele Gorla

DOI:

https://doi.org/10.26636/jtit.2002.4.147

Keywords:

cryptographic protocols, Dolev-Yao model, observational equivalence, process calculi, spi calculus

Abstract

Recently there has been much interest towards using formal methods in the analysis of security protocols. Some recent approaches take advantage of concepts and techniques from the field of process calculi. Process calculi can be given a formal yet simple semantics, which permits rigorous definitions of such concepts as ``attacker``, ``secrecy`` and ``authentication``. This feature has led to the development of solid reasoning methods and verification techniques, a few of which we outline in this paper.

Downloads

Download data is not yet available.

Downloads

Published

2002-12-30

Issue

Section

ARTICLES FROM THIS ISSUE

How to Cite

[1]
M. Boreale and D. Gorla, “Process calculi and the verification of security protocols”, JTIT, vol. 10, no. 4, pp. 28–40, Dec. 2002, doi: 10.26636/jtit.2002.4.147.