Abstract:
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker infer...Show MoreMetadata
Abstract:
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences and non-free term algebras. We argue that constraint solving for bounded process analysis can be used in conjunction with decidability of context-explicit protocols as a verification tool and can overcome those limitations. However, this is possible only when new decidability results are obtained for protocol security, especially in presence of non-standard inferences and non-free term algebras.
Date of Conference: 14-18 April 2008
Date Added to IEEE Xplore: 03 June 2008
ISBN Information:
Print ISSN: 1530-2075
College of Business and Information Systems, Dakota State University, Madison, SD, USA
Department of Math and Computer Science, University of Maryland, Eastern Shore, Princess Anne, MD, USA
College of Business and Information Systems, Dakota State University, Madison, SD, USA
Department of Math and Computer Science, University of Maryland, Eastern Shore, Princess Anne, MD, USA