{"title":"使用SPL(安全协议语言)增强网络语义的身份验证建模和验证","authors":"Roland Bouroulet, Hanna Klaudel, E. Pelz","doi":"10.1109/ACSD.2006.12","DOIUrl":null,"url":null,"abstract":"This paper proposes an enhanced translation of Security Protocol Language (SPL) in high-level Petri nets in order to allow to prove automatically, using model-checking techniques, the authentication property of Needham-Schroeder-Lowe (NSL) protocol. The proposed approach generates finite nets and goes this way beyond the limitation which was imposed by the previous semantics due to the treatment of the replication operator. In order to reach this goal, we modify the way attacks are modelled. Due to fact that the presented approach focuses on the treatment of the protocol environment, it may be successfully reused for automated verification of properties of other security protocols","PeriodicalId":282333,"journal":{"name":"Sixth International Conference on Application of Concurrency to System Design (ACSD'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Modelling and verification of authentication using enhanced net semantics of SPL (Security Protocol Language)\",\"authors\":\"Roland Bouroulet, Hanna Klaudel, E. Pelz\",\"doi\":\"10.1109/ACSD.2006.12\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes an enhanced translation of Security Protocol Language (SPL) in high-level Petri nets in order to allow to prove automatically, using model-checking techniques, the authentication property of Needham-Schroeder-Lowe (NSL) protocol. The proposed approach generates finite nets and goes this way beyond the limitation which was imposed by the previous semantics due to the treatment of the replication operator. In order to reach this goal, we modify the way attacks are modelled. Due to fact that the presented approach focuses on the treatment of the protocol environment, it may be successfully reused for automated verification of properties of other security protocols\",\"PeriodicalId\":282333,\"journal\":{\"name\":\"Sixth International Conference on Application of Concurrency to System Design (ACSD'06)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Sixth International Conference on Application of Concurrency to System Design (ACSD'06)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACSD.2006.12\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sixth International Conference on Application of Concurrency to System Design (ACSD'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACSD.2006.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modelling and verification of authentication using enhanced net semantics of SPL (Security Protocol Language)
This paper proposes an enhanced translation of Security Protocol Language (SPL) in high-level Petri nets in order to allow to prove automatically, using model-checking techniques, the authentication property of Needham-Schroeder-Lowe (NSL) protocol. The proposed approach generates finite nets and goes this way beyond the limitation which was imposed by the previous semantics due to the treatment of the replication operator. In order to reach this goal, we modify the way attacks are modelled. Due to fact that the presented approach focuses on the treatment of the protocol environment, it may be successfully reused for automated verification of properties of other security protocols