Pii: S0140-3664(99)00030-4
نویسندگان
چکیده
Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the security-related and cryptographic protocols used over open networks and distributed systems. The most commonly followed techniques for the application of formal methods for the ex-post analysis and verification of cryptographic protocols, as the analysis approach, are reviewed, followed by the examination of robustness principles and application limitations. Modern high-level specification languages and tools can be used for automatically analysing cryptographic protocols. Recent research work focuses on the ex-ante use of formal methods in the design state of new security protocols, as the synthesis approach. Finally, an outline is presented on current trends for the utilisation of formal methods for the analysis and verification of modern complicated protocols and protocol suites for the real commercial world. q 1999 Elsevier Science B.V. All rights reserved.
منابع مشابه
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the security-related and cryptographic protocols used over open networks and distributed systems. The most commonly followed techniques for the application of formal methods for the ex-post analysis and verification of cryptographic protocols, as the analysis approach, are reviewed, followed by the ex...
متن کاملCrash faults identification in wireless sensor networks
In this paper we consider the problem of identifying faulty (crashed) nodes in a wireless sensor network. This problem is of fundamental importance in those applicative scenarios of wireless sensor networks in which battery replacement is feasible. The diagnostic information gathered by operational sensors can be used by an external operator for the sake of network reconfiguration and/or repair...
متن کاملAdvanced service architecture for H.323 Internet Protocol Telephony
........................................................................................................................ I Acknowledgement ...................................................................................................... II Table of
متن کامل