作者: Paul Syverson , Catherine Meadows
DOI: 10.1007/BFB0053447
关键词: Information security 、 Computer science 、 Protocol (science) 、 Authentication protocol 、 Computer security 、 Requirements management 、 Software engineering 、 Cryptographic protocol 、 Protocol analysis 、 Needs analysis 、 Key distribution
摘要: We discuss generic formal requirements for reasoning about two party key distribution protocols, using a language developed specifying security protocols. Typically earlier work has considered analysis of already Our goal is to present sets various contexts which can be applied at the design stage as well existing use protocol tool we have determine whether or not specific met some specified. show how this process uncovered flaw in and helped us refine our requirements.