Result Details

The Use of Modal Logics in the Security Protocols Analysis

OČENÁŠEK, P.; TRCHALÍK, R. The Use of Modal Logics in the Security Protocols Analysis. Proceedings of the 12th Conference STUDENT EEICT 2006. Brno: Faculty of Electrical Engineering and Communication BUT, 2006. p. 395-399. ISBN: 80-214-3163-6.
Type
conference paper
Language
English
Authors
Abstract

Traditionally, security protocols have beendesigned and verified using various techniques. Formal logics have been used toidentify a number of flaws in protocols previously considered to be secure. Theselection of proper modal logic is a crucial goal in the protocol analysisprocess. This paper gives a comparative study of modal logics, which are widelyused in modeling of security protocols.

Keywords

Modal Logic, Security Protocol, Analysis

Published
2006
Pages
395–399
Proceedings
Proceedings of the 12th Conference STUDENT EEICT 2006
Conference
Student EEICT 2006
ISBN
80-214-3163-6
Publisher
Faculty of Electrical Engineering and Communication BUT
Place
Brno
BibTeX
@inproceedings{BUT22192,
  author="Pavel {Očenášek} and Roman {Trchalík}",
  title="The Use of Modal Logics in the Security Protocols Analysis",
  booktitle="Proceedings of the 12th Conference STUDENT EEICT 2006",
  year="2006",
  pages="395--399",
  publisher="Faculty of Electrical Engineering and Communication BUT",
  address="Brno",
  isbn="80-214-3163-6"
}
Projects
A Framework for Formal Specifications and Prototyping of Information System's Network Applications, GACR, Standardní projekty, GA102/05/0723, start: 2005-01-01, end: 2007-12-31, completed
Architectures of Embedded Systems Networks, GACR, Standardní projekty, GA102/05/0467, start: 2005-01-01, end: 2007-12-31, completed
Integrated approach to education of PhD students in the area of parallel and distributed systems, GACR, Doktorské granty, GD102/05/H050, start: 2005-01-01, end: 2008-12-31, completed
Research groups
Departments
Back to top