Automated Generation of Attack Routes for Service Security Analysis - A Preliminary Report.
Tong LiGolnaz ElahiLin LiuEric S. K. YuPublished in: iStar (2010)
Keyphrases
- security analysis
- authentication protocol
- encryption algorithm
- public key
- smart card
- security requirements
- defense mechanisms
- high security
- password guessing
- secret key
- service oriented
- web services
- user authentication
- security properties
- image encryption
- mutual authentication
- encryption scheme
- authentication scheme
- standard model