Abstract
The paper presents the OF-APSAF integrated framework for authention protocol analysis. The framework is built on top of a well-established formal method CSP and its supporting tools: Casper and FDR. The integral part of OF-APSAF is the object-oriented semi-formal approach to modelling of cryptographic protocols, their application context and security requirements. The modelling is based on UML and a catalogue of specialised analytical patterns. Object-orientation helps to cope with the complexity inherent to the domain of security protocols verification and formal methods in general.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
7 References
Burrows M., Abadi M. 1989. ‘A logic of authentication'. Technical Report 39, Digital Systems Research Center.
Roscoe A.W. 1998. ‘The Theory and Practice of Concurrency'. Prentice-Hall, International Series in Computer Science, ISBN 0-13-674409-5.
Ryan P.Y.A, Schneider S.A., Goldsmith M.H., Lowe G., Roscoe A.W. 2001. ‘The Modelling and Analysis of Security Protocols: the CSP Approach'. Addison-Wesley, ISBN 0-201-67471-8.
Lowe G. 1998, ‘Casper: A Compiler for the Analysis of Security Protocols'. Journal of Computer Security, Volume 6, pp. 53–84.
Object Management Group 2000. ‘OMG Unified Modelling Language Specification ver. 1.3’
Simoes P., Alves P., Rogado J., Ferreira P. 2000. ‘An Authentication Protocol for Mobile Devices'. Advance Program for International Workshop on Internet 2000.
Yamaguchi S., Okayama K., Miyahara H. 1991. ‘The design and implementation of an authentication system for the wide area distributed environment'. IEICE Transactions on Information and Systems. E74(11):3902–3909.
Hwang T., Yung-Hsiang Chen 1995. ‘On the security of splice/as: The authentication system in wide internet'. Information Processing Letters 53:97–101.
Górski J., Jarzębowicz A., Leszczyna R., Miler J., Olszewski M. 2003. ‘An Approach to Trust Case Development'. Lecture Notes in Computer Science 2788. Springer-Verlag. pp. 193–206.
http://www.e-mathesis.it/Drive/, IST-DRIVE project's official website.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this paper
Cite this paper
Górski, J., Olszewski, M. (2005). A model-based approach to analysis of authentication protocols. In: Saeed, K., Pejaś, J. (eds) Information Processing and Security Systems. Springer, Boston, MA. https://doi.org/10.1007/0-387-26325-X_19
Download citation
DOI: https://doi.org/10.1007/0-387-26325-X_19
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25091-5
Online ISBN: 978-0-387-26325-0
eBook Packages: Computer ScienceComputer Science (R0)