Skip navigation
Skip navigation

Security protocols, properties, and their monitoring

Bauer, Andreas; Juerjens, Jan


This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verification framework introduced in [5] to monitor complex, history-based security-properties of the SSL-protocol. We give a detailed account of the methodology, compare its formal expressiveness to prior art, and describe its application to an open-source Java-implementation of the SSL-protocol. In particular, we show how one...[Show more]

CollectionsANU Research Publications
Date published: 2008
Type: Conference paper
Source: Proceedings of 4th International Workshop on Software Engineering for Secure Systems (SESS-2008)
DOI: 10.1145/1370905.1370910


File Description SizeFormat Image
01_Bauer_Security_protocols,_2008.pdf388.87 kBAdobe PDF    Request a copy
02_Bauer_Security_protocols,_2008.pdf132 kBAdobe PDF    Request a copy
03_Bauer_Security_protocols,_2008.pdf1.28 MBAdobe PDF    Request a copy
04_Bauer_Security_protocols,_2008.pdf145.18 kBAdobe PDF    Request a copy
05_Bauer_Security_protocols,_2008.pdf173.38 kBAdobe PDF    Request a copy
06_Bauer_Security_protocols,_2008.pdf251.73 kBAdobe PDF    Request a copy

Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  20 July 2017/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator