dc.contributor.author | Su, Kai-Le | |
dc.contributor.author | Chen, Qing-Liang | |
dc.contributor.author | Sattar, Abdul | |
dc.contributor.author | Yue, Wei-Ya | |
dc.contributor.author | Lv, Guan-Feng | |
dc.contributor.author | Zheng, Xi-Zhong | |
dc.date.accessioned | 2017-05-03T14:39:32Z | |
dc.date.available | 2017-05-03T14:39:32Z | |
dc.date.issued | 2006 | |
dc.date.modified | 2007-08-07T04:52:24Z | |
dc.identifier.issn | 1000-9000 | |
dc.identifier.uri | http://hdl.handle.net/10072/11407 | |
dc.description.abstract | This paper introduces a new methodology that uses knowledge structures, a specific form of Kripke semantics for epistemic logic, to analyze communication protocols over hostile networks. The paper particularly focuses on automatic verification of authentication protocols. Our approach is based on the actual definitions of a protocol, not on some difficult-to-establish justifications. The proposed methodology is different from many previous approaches to automatic verification of security protocols in that it is justification-oriented instead of falsification-oriented, i.e., finding bugs in a protocol. The main idea is based on observations: separating a principal executing a run of protocol from the role in the protocol, and inferring a principal's knowledge from the local observations of the principal. And we show analytically and empirically that this model can be easily reduced to Satisfiability (SAT) problem and efficiently implemented by a modern SAT solver. | |
dc.description.peerreviewed | Yes | |
dc.description.publicationstatus | Yes | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.publisher.place | New York | |
dc.publisher.uri | https://link.springer.com/journal/11390/volumes-and-issues/21-6 | |
dc.relation.ispartofstudentpublication | N | |
dc.relation.ispartofpagefrom | 932 | |
dc.relation.ispartofpageto | 943 | |
dc.relation.ispartofissue | 6 | |
dc.relation.ispartofjournal | Journal of Computer Science and Technology | |
dc.relation.ispartofvolume | 21 | |
dc.rights.retention | Y | |
dc.subject.fieldofresearch | Information and computing sciences | |
dc.subject.fieldofresearchcode | 46 | |
dc.title | Verification of Authentication Protocols for Epistemic Goals via SAT Compilation | |
dc.type | Journal article | |
dc.type.description | C1 - Articles | |
dc.type.code | C - Journal Articles | |
gro.faculty | Griffith Sciences, School of Information and Communication Technology | |
gro.rights.copyright | © 2006 Springer : Reproduced in accordance with the copyright policy of the publisher : The original publication will be available at SpringerLink (use hypertext links) | |
gro.date.issued | 2006 | |
gro.hasfulltext | No Full Text | |
gro.griffith.author | Sattar, Abdul | |
gro.griffith.author | Su, Kaile | |