Skip navigation
Skip navigation

Security protocols, properties, and their monitoring

Bauer, Andreas; Juerjens, Jan

Description

This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verification framework introduced in [5] to monitor complex, history-based security-properties of the SSL-protocol. We give a detailed account of the methodology, compare its formal expressiveness to prior art, and describe its application to an open-source Java-implementation of the SSL-protocol. In particular, we show how one...[Show more]

CollectionsANU Research Publications
Date published: 2008
Type: Conference paper
URI: http://hdl.handle.net/1885/53393
Source: Proceedings of 4th International Workshop on Software Engineering for Secure Systems (SESS-2008)
DOI: 10.1145/1370905.1370910

Download

File Description SizeFormat Image
01_Bauer_Security_protocols,_2008.pdf388.87 kBAdobe PDF    Request a copy
02_Bauer_Security_protocols,_2008.pdf132 kBAdobe PDF    Request a copy
03_Bauer_Security_protocols,_2008.pdf1.28 MBAdobe PDF    Request a copy
04_Bauer_Security_protocols,_2008.pdf145.18 kBAdobe PDF    Request a copy
05_Bauer_Security_protocols,_2008.pdf173.38 kBAdobe PDF    Request a copy
06_Bauer_Security_protocols,_2008.pdf251.73 kBAdobe PDF    Request a copy


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  23 August 2018/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator