A Logic of Authentication
by Michael Burrows, Roger Needham
url show details
Details
number: | 1 | journal: | ACM Transactions on Computer Systems | type: | misc | publisher: | ACM Press | abstract: | this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs. Our formalism has enabled us to isolate and express these differences with a precision that was not previously possible. It has drawn attention to features of protocols of which we and their authors were previously unaware, and allowed us to suggest improvements to the protocols. The reasoning about some protocols has been mechanically verified. This paper starts with an informal account of the problem, goes on to explain the formalism to be used | year: | 1990 | annote: | Michael Burrows (Digital Equipment Corporation | address: | Litchfield Park, Arizona | month: | feb | pages: | 18--36 | note: | revised version, appeared also as \cite{BuAbNe90a} | volume: | 8 | booktitle: | SOSP | institution: | Digital Equipment Corporation, Systems Research Centre | editor: | John Ousterhout |
|
|
You need to log in to add tags and post comments.