Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization.
Yating HsuDavid LeePublished in: ICNP (2010)
Keyphrases
- security requirements
- security analysis
- access control
- authentication protocol
- lightweight
- data encryption
- security properties
- security model
- security mechanisms
- security policies
- security services
- key agreement protocol
- key agreement
- access control policies
- formal analysis
- key distribution
- user authentication
- identity authentication
- trust negotiation
- intrusion detection
- authentication mechanism