Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Digital Identity Management (DIM 2007)
Guest editors: Atsuhiro GotoGuest-Editor
Article type: Research Article
Authors: Mödersheim, Sebastiana | Viganò, Lucab; * | Basin, Davidc
Affiliations: [a] IBM Zurich Research Laboratory, Zurich, Switzerland. E-mail: [email protected] | [b] Department of Computer Science, University of Verona, Verona, Italy. E-mail: [email protected] | [c] Department of Computer Science, ETH Zurich, Zurich, Switzerland. E-mail: [email protected]
Correspondence: [*] Corresponding author: L. Viganò, Department of Computer Science, University of Verona, Verona, Italy. Tel.: +39 045 8027070; Fax: +39 045 8027068.
Abstract: We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation works by eliminating certain kinds of redundancies that arise in the search space when using constraints to represent and manipulate the messages that may be sent by an active intruder. We define constraint differentiation in a general way, independent of the technical and conceptual details of the underlying constraint-based method and protocol model. Formally, we prove that constraint differentiation terminates and is correct, under the assumption that the original constraint-based approach has these properties. Practically, as a concrete case study, we have integrated this technique into OFMC, a state-of-the-art model-checker for security protocol analysis, and demonstrated its effectiveness by extensive experimentation. Our results show that constraint differentiation substantially reduces search and considerably improves the performance of OFMC, enabling its application to a wider class of problems.
Keywords: Security protocols, security protocol verification, constraints, model checking, partial-order reduction
DOI: 10.3233/JCS-2009-0351
Journal: Journal of Computer Security, vol. 18, no. 4, pp. 575-618, 2010
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]