SSL and TLS Essentials: Securing the Web with CD-ROM
SSL and TLS Essentials: Securing the Web with CD-ROM
The Theory and Practice of Concurrency
The Theory and Practice of Concurrency
Authentication tests and the structure of bundles
Theoretical Computer Science
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Using static analysis to validate the SAML single sign-on protocol
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
LTL Model Checking for Security Protocols
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
Language Based Secure Communication
CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
Specifying Secure Transport Channels
CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Secrecy and authenticity types for secure distributed messaging
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
Understanding abstractions of secure channels
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Analysing applications layered on unilaterally authenticating protocols
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Analysing TLS in the strand spaces model
Journal of Computer Security
Hi-index | 0.00 |
We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol is layered on top of a secure transport protocol. The model abstracts away from the implementation of the secure transport protocol and just captures the properties that it provides to the Application Layer. We illustrate the usefulness of the model by using it to verify a small single sign-on protocol.