Abstract
While most branches of engineering consist of methodologies for building complex systems from simple components, formulating incremental and compositional methods for Security Engineering has been a daunting task: in general, security properties are not preserved under refinement or composition. The reason is that the nondestructive composition operations require that their static assumptions about the environment are maintained; but Security Engineering is concerned with dynamic, adversarial environments, and what happens when the assumptions fail.
Similar content being viewed by others
References
Anlauff, M., Pavlovic, D.: The protocol derivation assistant (2005), http://www.kestrel.edu/software/pda
Anlauff, M., Pavlovic, D., Waldinger, R., Westfold, S.: Proving authentication properties in the protocol derivation assistant (submitted) (May 2006)
Baugher, M., Weis, B., Hardjono, T., Harney, H.: The group domain of interpretation. Network Working Group, Internet Engineering Task Force. RFC 3547 (July 2003)
Meadows, C., Pavlovic, D.: Deriving, attacking and defending the gdoi protocol. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 53–72. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pavlovic, D. (2006). Connector-Based Software Development: Deriving Secure Protocols. In: Misra, J., Nipkow, T., Sekerinski, E. (eds) FM 2006: Formal Methods. FM 2006. Lecture Notes in Computer Science, vol 4085. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11813040_41
Download citation
DOI: https://doi.org/10.1007/11813040_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37215-8
Online ISBN: 978-3-540-37216-5
eBook Packages: Computer ScienceComputer Science (R0)