Issues in Generating Security Protocols Automatically
نویسنده
چکیده
Protocol design is a very challenging and knowledge-intensive task. Designing a protocol is as hard as synthesizing a program. In this paper, we will first discuss the issues in our automatic security protocol generator, and then propose an approach to constructing security protocols intelligently, based on a security property specification and an extensible general-purpose library of schemas. Each schema is defined by specifying intended behaviors and is described as a sequence of primitive messages. Finally, some conclusions are drawn. Keyword(s): security protocols; protocol specification; security property
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
متن کاملTowards Automated Execution of Security Protocols for Web Services
Existing solutions for authentication and authorization in Web services make use of technologies such as SAML or WS-Security. These provide a static solution by using a set of predefined protocols. We propose a dynamic approach for the automated execution problem by developing a semantic security protocol model from which security protocol specifications are generated and automatically executed...
متن کاملWork in Progress: Towards Automated Secure Web Service Execution
Existing solutions for authentication and authorization in Web services make use of technologies such as SAML or WS-Security. These provide a static solution by using a set of predefined protocols. We propose a semantic security protocol model from which security protocol specifications are generated and automatically executed by participants. The proposed model consists of a sequential compone...
متن کاملTowards Automated Secure Web Service Execution
Existing solutions for authentication and authorization in Web services make use of technologies such as SAML or WS-Security. These provide a static solution by using a set of predefined protocols. We propose a semantic security protocol model from which security protocol specifications are generated and automatically executed by participants. The proposed model consists of a sequential compone...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001