Published in

Springer Verlag, Lecture Notes in Computer Science, p. 352-366

DOI: 10.1007/10930755_23

Links

Tools

Export citation

Search in Google Scholar

Verifying Second-Level Security Protocols

Journal article published in 2003 by Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of classical authentication protocols has become routine, but second-level protocols raise new challenges. These include the formalisation of appeals to the underlying protocols, the modification of the threat model, and the formalisation of the novel goals. These challenges have been met using Isabelle and the Inductive Approach [14]. The outcomes are demonstrated on a recent protocol for certified e-mail delivery by Abadi et al. [2]. 1