TY - GEN
T1 - Formal modeling and analyzing Kerberos protocol
AU - Qin, Li
AU - Fan, Yang
AU - Huibiao, Zhu
AU - Longfei, Zhu
PY - 2009
Y1 - 2009
N2 - Kerberos protocol is one of the popular security protocols used to authenticate the identities of the communication participants. The key distribution mechanism in this protocol is suitable for other secure applications. We formalize the protocol using CSP methods. Based on the formal model, the mechanism of the protocol is exposed to us clearly. Principles and tools support the verification of the formal model. In that way, we can prove that the system protected by the protocol is indeed secure as it declared. The reasons for security can be fixed out formally as a reference to analyzing other protocols.
AB - Kerberos protocol is one of the popular security protocols used to authenticate the identities of the communication participants. The key distribution mechanism in this protocol is suitable for other secure applications. We formalize the protocol using CSP methods. Based on the formal model, the mechanism of the protocol is exposed to us clearly. Principles and tools support the verification of the formal model. In that way, we can prove that the system protected by the protocol is indeed secure as it declared. The reasons for security can be fixed out formally as a reference to analyzing other protocols.
UR - https://www.scopus.com/pages/publications/71049125790
U2 - 10.1109/CSIE.2009.64
DO - 10.1109/CSIE.2009.64
M3 - 会议稿件
AN - SCOPUS:71049125790
SN - 9780769535074
T3 - 2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009
SP - 813
EP - 819
BT - 2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009
T2 - 2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009
Y2 - 31 March 2009 through 2 April 2009
ER -