Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification

With the proliferation of universal clients over Internet, use of security protocols is rapidly on rise to minimize associated risks. Security protocols are required to be verified thoroughly before being used to secure applications. There are several approaches and tools exist to verify security pr...

Full description

Saved in:
Bibliographic Details
Published inRecent Trends in Network Security and Applications pp. 152 - 163
Main Authors Patel, Reema, Borisaniya, Bhavesh, Patel, Avi, Patel, Dhiren, Rajarajan, Muttukrishnan, Zisman, Andrea
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2010
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text
ISBN9783642144776
3642144772
ISSN1865-0929
1865-0937
DOI10.1007/978-3-642-14478-3_16

Cover

More Information
Summary:With the proliferation of universal clients over Internet, use of security protocols is rapidly on rise to minimize associated risks. Security protocols are required to be verified thoroughly before being used to secure applications. There are several approaches and tools exist to verify security protocols. Out of these one of the more suitable is the Formal approach. In this paper, we give an overview of different formal methods and tools available for security protocol verification.
ISBN:9783642144776
3642144772
ISSN:1865-0929
1865-0937
DOI:10.1007/978-3-642-14478-3_16