Abstract
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspects in a uniform way based on combinatorial optimisation techniques. BAN logic is viewed as both a specification and proof system and as a 'protocol programming language' The paper shows how evolutionary search in the form of genetic algorithms can be utilised to 'grow' correct and efficient BAN protocols and shows hour goals and assumptions can co-evolve, effectively engaging in 'specification synthesis'.
Original language | English |
---|---|
Title of host publication | 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS |
Place of Publication | LOS ALAMITOS |
Publisher | IEEE Computer Society |
Pages | 82-95 |
Number of pages | 14 |
ISBN (Print) | 0-7695-0665-8 |
Publication status | Published - 2000 |
Event | 2000 IEEE Symposium on Security and Privacy (S - BERKELEY Duration: 14 May 2000 → 17 May 2000 |
Conference
Conference | 2000 IEEE Symposium on Security and Privacy (S |
---|---|
City | BERKELEY |
Period | 14/05/00 → 17/05/00 |