Modeling and Analyzing Security Protocols in SAM: A Case Study

Z. Dai, X. He, J. Ding, and S. Gao (USA)

Keywords

Security protocol, SAM framework, model checking, formal verification

Abstract

Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use SAM, a dual formalism based on Petri nets and temporal logic, to provide a systematic approach to specify and analyze security protocols and their desired properties. We illustrate our approach through a case study.

Important Links:



Go Back


IASTED
Rotating Call For Paper Image