Reference Hub2
A Formal Verification Centred Development Process for Security Protocols

A Formal Verification Centred Development Process for Security Protocols

Tom Coffey
Copyright: © 2009 |Pages: 14
ISBN13: 9781599048550|ISBN10: 1599048558|EISBN13: 9781599048567
DOI: 10.4018/978-1-59904-855-0.ch014
Cite Chapter Cite Chapter

MLA

Coffey, Tom. "A Formal Verification Centred Development Process for Security Protocols." Handbook of Research on Information Security and Assurance, edited by Jatinder N. D. Gupta and Sushil Sharma, IGI Global, 2009, pp. 165-178. https://doi.org/10.4018/978-1-59904-855-0.ch014

APA

Coffey, T. (2009). A Formal Verification Centred Development Process for Security Protocols. In J. Gupta & S. Sharma (Eds.), Handbook of Research on Information Security and Assurance (pp. 165-178). IGI Global. https://doi.org/10.4018/978-1-59904-855-0.ch014

Chicago

Coffey, Tom. "A Formal Verification Centred Development Process for Security Protocols." In Handbook of Research on Information Security and Assurance, edited by Jatinder N. D. Gupta and Sushil Sharma, 165-178. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-59904-855-0.ch014

Export Reference

Mendeley
Favorite

Abstract

This chapter concerns the correct and reliable design of modern security protocols. It discusses the importance of formal verification of security protocols prior to their release by publication or implementation. A discussion on logic-based verification of security protocols and its automation provides the reader with an overview of the current state-of-the-art of formal verification of security protocols. The authors propose a formal verification centred development process for security protocols. This process provides strong confidence in the correctness and reliability of the designed protocols. Thus, the usage of weak security protocols in communication systems is prevented. A case-study on the development of a security protocol demonstrates the advantages of the proposed approach. The case-study concludes with remarks on the performance of automated logic-based verification and presents an overview of formal verification results of a range of modern security protocols.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.