Operational Semantics of Security Protocols

@inproceedings{Cremers2003OperationalSO,
  title={Operational Semantics of Security Protocols},
  author={Cas J. F. Cremers and Sjouke Mauw},
  booktitle={Scenarios: Models, Transformations and Tools},
  year={2003}
}
Based on a concise domain analysis we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e.g. the intruder model. Further characteristics of the model are a straightforward handling of parallel execution of multiple protocols, locality of security claims, the binding of local constants to role instances, and explicitly defined initial intruder knowledge. We validate our framework by analysing the Needham… CONTINUE READING
Highly Cited
This paper has 65 citations. REVIEW CITATIONS

4 Figures & Tables

Topics

Statistics

051015'05'06'07'08'09'10'11'12'13'14'15'16'17'18
Citations per Year

66 Citations

Semantic Scholar estimates that this publication has 66 citations based on the available data.

See our FAQ for additional information.