[1993] Proceedings Computer Security Foundations Workshop VI
DOI: 10.1109/csfw.1993.246632
|View full text |Cite
|
Sign up to set email alerts
|

Abstract machines for communication security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…This method allows for formal verification of security properties through translation of the spi-calculus specifications to a format that can be verified by ProVerif prior to code generation. -In 1993 and in 2009, Bieber et al [18] and Benaissa et al [12] respectively proposed an approach to analyze the security of cryptographic protocols using the Event-B framework. To the best of our knowledge, they partly implement the Dolev-Yao model as a library for the internal verifier of Event-B, allowing them to specify lemmas describing security properties to be proven such as secrecy and authentication.…”
Section: Cryptographic Protocol Code Generation Toolsmentioning
confidence: 99%
“…This method allows for formal verification of security properties through translation of the spi-calculus specifications to a format that can be verified by ProVerif prior to code generation. -In 1993 and in 2009, Bieber et al [18] and Benaissa et al [12] respectively proposed an approach to analyze the security of cryptographic protocols using the Event-B framework. To the best of our knowledge, they partly implement the Dolev-Yao model as a library for the internal verifier of Event-B, allowing them to specify lemmas describing security properties to be proven such as secrecy and authentication.…”
Section: Cryptographic Protocol Code Generation Toolsmentioning
confidence: 99%
“…Boyd has formalized analogous results using Z [11]. Bieber et al model abstract channels using the B method [10] and refine them to cryptographic implementations. Abadi et al [1] formalize secure channels in a variant of the join calculus and establish full abstraction results for translations to cryptographic implementations.…”
Section: Related Workmentioning
confidence: 99%