Proceedings. Fourth International Conference on Application of Concurrency to System Design, 2004. ACSD 2004.
Download PDF

Abstract

This paper aims at introducing a Petri net semantics of security protocols allowing to study their properties formally. This is obtained by means of an economic but expressive class of composable high-level Petri nets, called S-nets, inspired from works about the relationship between Petri nets and process algebras. S-nets are applied then to give a compositional high-level Petri net semantics to SPL. The Needham-Schr?der protocol is employed to illustrate how this semantics can be used in order to establish the violation of the authentication property.
Like what you’re reading?
Already a member?Sign In
Member Price
$11
Non-Member Price
$21
Add to CartSign In
Get this article FREE with a new membership!

Related Articles