Towards the Formal Verification of Electronic Commerce Protocols
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Towards a Completeness Result for Model Checking of Security Protocols
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Proving Security Protocols with Model Checkers by Data Independence Techniques
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Efficient verification of real-time systems: compact data structure and state-space reduction
RTSS '97 Proceedings of the 18th IEEE Real-Time Systems Symposium
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
Proceedings of the 2005 ACM symposium on Applied computing
Timed verification of the reliable adaptive multicast protocol
Journal of Systems and Software
Rule-based static analysis of network protocol implementations
Information and Computation
Verification of Web Services with Timed Automata
Electronic Notes in Theoretical Computer Science (ENTCS)
Timed automata for web services verification
ACS'06 Proceedings of the 6th WSEAS international conference on Applied computer science
Verified Cryptographic Implementations for TLS
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Automatic translation of WS-CDL choreographies to timed automata
EPEW'05/WS-FM'05 Proceedings of the 2005 international conference on European Performance Engineering, and Web Services and Formal Methods, international conference on Formal Techniques for Computer Systems and Business Processes
Analysis and verification of time requirements applied to the web services composition
WS-FM'06 Proceedings of the Third international conference on Web Services and Formal Methods
Analysing TLS in the strand spaces model
Journal of Computer Security
Hi-index | 0.00 |
E-commerce is based on transactions between client and server agents. These transactions require a protocol that provides privacy and reliability between these two agents. A widely used protocol on e-commerce is Transport Layer Security (TLS). In this paper we present a way to use Formal Methods to ensure the e-commerce properties of this protocol. Specifically we use a known tool for Model Checking (UPPAAL) to describe and analyze the behaviour of the protocol (by means of timed automata). Thus, with this tool we can make an automatic verification of TLS.