000 02906nam a22003735i 4500
001 296243
003 MX-SnUAN
005 20160429155300.0
007 cr nn 008mamaa
008 150903s2007 gw | o |||| 0|eng d
020 _a9783540681366
_99783540681366
024 7 _a10.1007/9783540681366
_2doi
035 _avtls000349950
039 9 _a201509030458
_bVLOAD
_c201405050349
_dVLOAD
_y201402071215
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aQA8.9-QA10.3
100 1 _aBella, Giampaolo.
_eautor
_9331173
245 1 0 _aFormal Correctness of Security Protocols :
_bWith 62 Figures and 4 Tables /
_cby Giampaolo Bella.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2007.
300 _axIx, 274 páginas 62 ilustraciones
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aInformation Security and Cryptography, Texts and Monographs,
_x1619-7100
500 _aSpringer eBooks
505 0 _aThe Analysis of Security Protocols -- The Inductive Method -- Verifying the Protocol Goals -- The Principle of Goal Availability -- Modelling Timestamping and Verifying a Classical Protocol -- Verifying a Deployed Protocol -- Modelling Agents’ Knowledge of Messages -- Verifying Another Deployed Protocol -- Modelling Smartcards -- Verifying a Smartcard Protocol -- Modelling Accountability -- Verifying Two Accountability Protocols -- Conclusions.
520 _aComputer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties. The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis, the Inductive Method in the theorem prover Isabelle, turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating. This book will benefit researchers and graduate students in the fields of formal methods, information security, inductive methods, and networking.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783540681342
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-540-68136-6
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c296243
_d296243