The aim of the work presented in this paper is to check cryptographic protocols for mobile agents against both network intruders and malicious hosts using formal methods. We focus attention on data integrity properties and show how the techniques used for classical message-based protocols such as authentication protocols can be applied to mobile agent systems as well. To illustrate our approach, we use a case study taken from the literature and show how it can be specified and verified using some currently available tools.

Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study / Hannotin, X.; Maggi, P.; Sisto, Riccardo. - 2240:(2001), pp. 42-53. ((Intervento presentato al convegno Mobile Agents 5th International Conference, MA 2001 tenutosi a Atlanta, GA (USA) nel December 2–4, 2001 [10.1007/3-540-45647-3_4].

Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study

SISTO, Riccardo
2001

Abstract

The aim of the work presented in this paper is to check cryptographic protocols for mobile agents against both network intruders and malicious hosts using formal methods. We focus attention on data integrity properties and show how the techniques used for classical message-based protocols such as authentication protocols can be applied to mobile agent systems as well. To illustrate our approach, we use a case study taken from the literature and show how it can be specified and verified using some currently available tools.
3540429522
File in questo prodotto:
File Dimensione Formato  
1418129.pdf

non disponibili

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 133.64 kB
Formato Adobe PDF
133.64 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

Caricamento pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/11583/1418129
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo