Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification
With the proliferation of universal clients over Internet, use of security protocols is rapidly on rise to minimize associated risks. Security protocols are required to be verified thoroughly before being used to secure applications. There are several approaches and tools exist to verify security pr...
Saved in:
| Published in | Recent Trends in Network Security and Applications pp. 152 - 163 |
|---|---|
| Main Authors | , , , , , |
| Format | Book Chapter |
| Language | English |
| Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
2010
|
| Series | Communications in Computer and Information Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783642144776 3642144772 |
| ISSN | 1865-0929 1865-0937 |
| DOI | 10.1007/978-3-642-14478-3_16 |
Cover
| Summary: | With the proliferation of universal clients over Internet, use of security protocols is rapidly on rise to minimize associated risks. Security protocols are required to be verified thoroughly before being used to secure applications. There are several approaches and tools exist to verify security protocols. Out of these one of the more suitable is the Formal approach. In this paper, we give an overview of different formal methods and tools available for security protocol verification. |
|---|---|
| ISBN: | 9783642144776 3642144772 |
| ISSN: | 1865-0929 1865-0937 |
| DOI: | 10.1007/978-3-642-14478-3_16 |