{"title":"一个用于规范和分析密钥管理协议的系统","authors":"C. Meadows","doi":"10.1109/RISP.1991.130786","DOIUrl":null,"url":null,"abstract":"Describes a formal specification language and verification technique for analyzing key management protocols. A prototype verification tool that can be used to apply this technique is introduced. A protocol intended for use in the management of resource sharing, is formally specified and verified, and it is shown how the use of the considered techniques led to the discovery of a flaw that could be exploited by an intruder to convince a user of the system that he has obtained a service when he actually has not.<<ETX>>","PeriodicalId":445112,"journal":{"name":"Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"72","resultStr":"{\"title\":\"A system for the specification and analysis of key management protocols\",\"authors\":\"C. Meadows\",\"doi\":\"10.1109/RISP.1991.130786\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Describes a formal specification language and verification technique for analyzing key management protocols. A prototype verification tool that can be used to apply this technique is introduced. A protocol intended for use in the management of resource sharing, is formally specified and verified, and it is shown how the use of the considered techniques led to the discovery of a flaw that could be exploited by an intruder to convince a user of the system that he has obtained a service when he actually has not.<<ETX>>\",\"PeriodicalId\":445112,\"journal\":{\"name\":\"Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1991-05-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"72\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RISP.1991.130786\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RISP.1991.130786","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A system for the specification and analysis of key management protocols
Describes a formal specification language and verification technique for analyzing key management protocols. A prototype verification tool that can be used to apply this technique is introduced. A protocol intended for use in the management of resource sharing, is formally specified and verified, and it is shown how the use of the considered techniques led to the discovery of a flaw that could be exploited by an intruder to convince a user of the system that he has obtained a service when he actually has not.<>