By Topic

Model Checking the SET Purchasing Process Protocol with SPIN

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jing Li ; Coll. of Inf. Eng., Qingdao Univ., Qingdao, China ; Jinhua Li

Electronic Commerce is a considerable wide spread business engineering model in the Internet. The analysis of the EC's security is a hot research topic in the present. The article studies the Secure Electronics Transactions (SET) protocol and uses the model checking tool SPIN to model and to verify the key part of the protocol-purchasing process protocol. We describe the abstract model of the protocol with promela language of SPIN. During the modeling process, we plant some exploits which the intruders can take advantage of. Then we use LTL to describe the attributes that the protocol should satisfy and carry out the model checking. In our experiment, the intruder is detected with the tool SPIN.

Published in:

2009 5th International Conference on Wireless Communications, Networking and Mobile Computing

Date of Conference:

24-26 Sept. 2009