Skip to Main content Skip to Navigation
New interface
Conference papers

Automated verification of security protocols and application to services

Michael Rusinowitch 1 
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : We survey some results on security protocol analysis that have contributed to the development of verification systems capable of detecting real flaws. In particular we recall the principles of constrained-based analysis of security protocols and some decision procedures based on algebraic properties of cryptographic functions. We present some potential applications of the same security protocol analysis techniques to service oriented computing such as the synthesis of a secure composed service and its validation.
Document type :
Conference papers
Complete list of metadata
Contributor : Michaël Rusinowitch Connect in order to contact the contributor
Submitted on : Saturday, December 7, 2013 - 11:38:05 AM
Last modification on : Friday, January 21, 2022 - 3:08:59 AM


  • HAL Id : hal-00915323, version 1


Michael Rusinowitch. Automated verification of security protocols and application to services. Verification and Evaluation of Computer and Communication Systems, Alessandro Fantechi, University of Florence, Italy, Nov 2013, Florence, Italy. ⟨hal-00915323⟩



Record views