Secure Transaction Protocol Analysis: Models and Applications
β Scribed by Qingfeng Chen, Chengqi Zhang, Shichao Zhang (auth.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2008
- Tongue
- English
- Leaves
- 238
- Series
- Lecture Notes in Computer Science 5111 : Programming and Software Engineering
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce.
The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and conflicting beliefs in messages. Chapter 6 integrates data mining with security protocol analysis, and Chapter 7 develops a new technique for detecting collusion attack in security
protocols. Chapter 8 gives a summary of the chapters and presents a brief discussion of some emerging issues in the field.
β¦ Table of Contents
Front Matter....Pages -
Introduction....Pages 1-15
Overview of Security Protocol Analysis....Pages 17-72
Formal Analysis of Secure Transaction Protocols....Pages 73-106
Model Checking in Security Protocol Analysis....Pages 107-129
Uncertainty Issues in Secure Messages....Pages 131-173
Applications of Data Mining in Protocol Analysis....Pages 175-192
Detection Models of Collusion Attacks....Pages 193-216
Conclusion and Future Works....Pages 217-221
Back Matter....Pages -
β¦ Subjects
Computer Communication Networks; Operating Systems; Software Engineering; Data Mining and Knowledge Discovery; Information Storage and Retrieval; Information Systems Applications (incl.Internet)
π SIMILAR VOLUMES
<span>The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. The development of these formal methodsismotivatedbythehostilenatureofsomeaspectsofthenetworkand th
Security protocols are one of the most critical elements in enabling the secure communication and processing of information, ensuring its confidentiality, integrity, authenticity and availability. These protocols are vulnerable to a host of subtle attacks, so designing protocols to be impervious to
Book by
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, held in York, UK, in March 2009, in association with ETAPS 2009. The 12 revised full papers
<p><span>Mathematical Modeling: Models, Analysis and Applications, Second Edition</span><span> introduces models of both discrete and continuous systems. This book is aimed at newcomers who desires to learn mathematical modeling, especially students taking a first course in the subject. Beginning wi