About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Journal article

A Calculus for Control Flow Analysis of Security Protocols

From

Department of Informatics and Mathematical Modeling, Technical University of Denmark1

Computer Science and Engineering, Department of Informatics and Mathematical Modeling, Technical University of Denmark2

The design of a process calculus for anaysing security protocols is governed by three factors: how to express the security protocol in a precise and faithful manner, how to accommodate the variety of attack scenarios, and how to utilise the strengths (and limit the weaknesses) of the underlying analysis methodology.

We pursue an analysis methodology based on control flow analysis in flow logic style and we have previously shown its ability to analyse a variety of security protocols. This paper develops a calculus, LysaNS that allows for much greater control and clarity in the description of attack scenarios, that gives a more flexible format for expressing protocols, and that at the same time allows to circumvent some of the ``false positives'' arising in previous work.

Language: English
Publisher: Springer Berlin Heidelberg
Year: 2004
Pages: 145-167
ISSN: 16155270 and 16155262
Types: Journal article
DOI: 10.1007/s10207-004-0036-x
ORCIDs: Nielson, Hanne Riis and Nielson, Flemming

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis