Model-Based Verification of a Security Protocol for Conditional Access to Services.
Guy LeducOlivier BonaventureLuc LéonardEckhart KoernerCharles PecheurPublished in: Formal Methods Syst. Des. (1999)
Keyphrases
- security protocols
- security services
- access control
- internet services
- security mechanisms
- content providers
- artificial immune algorithm
- web services
- cryptographic algorithms
- context aware
- service providers
- key management
- information systems
- authentication protocol
- digital objects
- end users
- directory service
- digital government
- data processing
- query processing
- public key infrastructure
- database systems
- real time