Research Article
Modeling Security Protocols as Games
@INPROCEEDINGS{10.1109/IAS.2007.44, author={ Mohamed Saleh and Mourad Debbabi}, title={Modeling Security Protocols as Games}, proceedings={3rd International ICST Symposium on Information Assurance and Security}, publisher={IEEE}, proceedings_a={IAS}, year={2007}, month={9}, keywords={Game semantics Modeling cryptographic protocols. Security protocols}, doi={10.1109/IAS.2007.44} }
- Mohamed Saleh
Mourad Debbabi
Year: 2007
Modeling Security Protocols as Games
IAS
IEEE
DOI: 10.1109/IAS.2007.44
Abstract
We model security protocols as a game tree using concepts of game semantics. The model interprets protocol specifications as strategies over a game tree that represents the type of the protocol. The specifications are written in the simple arrow notation commonly used. The model allows us to give formal semantics to this notation. Furthermore, the model can be used for verification of various security properties.
Copyright © 2007–2024 IEEE