RUS  ENG
Full version
JOURNALS // Informatics and Automation // Archive

Tr. SPIIRAN, 2009 Issue 8, Pages 292–310 (Mi trspy14)

Security protocols verification combining existing approaches and tools

I. V. Kotenko, S. A. Reznik, A. V. Shorov

St. Petersburg Institute for Informatics and Automation of RAS

Abstract: This paper evaluates existing approaches to the security protocols verification and explains why it is impossible to thoroughly verify security protocols using only one of them. To solve this problem combined verification approach which is based on the assembly of strong sides specific for different existing approaches and tools is suggested.

Keywords: security protocols, formal methods, verification, model checking, theorem proving.

UDC: 004.42:004.94:004.7



© Steklov Math. Inst. of RAS, 2024