Computer Science – Cryptography and Security
Scientific paper
2009-08-29
Computer Science
Cryptography and Security
2009 IEEE International Conference on Intelligent Communication and Processing (ICCP 2009), Cluj-Napoca, Romania, pp. 251-258
Scientific paper
Determining if two protocols can be securely composed requires analyzing not only their additive properties but also their destructive properties. In this paper we propose a new composition method for constructing protocols based on existing ones found in the literature that can be fully automatized. The additive properties of the composed protocols are ensured by the composition of protocol preconditions and effects, denoting, respectively, the conditions that must hold for protocols to be executed and the conditions that hold after executing the protocols. The non-destructive property of the final composed protocol is verified by analyzing the independence of the involved protocols, a method proposed by the authors in their previous work. The fully automatized property is ensured by constructing a rich protocol model that contains explicit description of protocol preconditions, effects, generated terms and exchanged messages. The proposed method is validated by composing 17 protocol pairs and by verifying the correctness of the composed protocols with an existing tool.
Genge Bela
Haller Piroska
Ignat Iosif
No associations
LandOfFree
Automated Composition of Security Protocols does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Automated Composition of Security Protocols, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automated Composition of Security Protocols will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-597420