Gaining trust by tracing security protocols.
Lars-Åke FredlundClara Benac EarleThomas ArtsHans SvenssonPublished in: J. Log. Algebraic Methods Program. (2023)
Keyphrases
- security protocols
- security services
- automated design
- security properties
- key management
- cryptographic algorithms
- security mechanisms
- artificial immune algorithm
- trust model
- authentication protocol
- secure communication
- security requirements
- cryptographic protocols
- software engineering
- lightweight
- knowledge management
- trust relationships
- web services
- information systems