Scenario-based specification of security protocols and transformation to security model checkers.
Thorsten KochStefan DziwokJörg HoltmannEric BoddenPublished in: MoDELS (2020)
Keyphrases
- security model
- security protocols
- security requirements
- security mechanisms
- security properties
- access control
- public key
- security analysis
- automated design
- smart card
- secure communication
- information security
- authentication protocol
- security services
- provably secure
- rfid tags
- security policies
- artificial intelligence
- key management
- object oriented
- data mining
- encryption scheme
- security issues
- data processing
- database systems
- information systems
- public key cryptography