Utilization of Timed Automata as a Verification Tool for Security Protocols
| dc.contributor.author | Koltuksuz, Ahmet | |
| dc.contributor.author | Külahçıoğlu, Burcu | |
| dc.contributor.author | Özkan, Murat | |
| dc.coverage.doi | 10.1109/SSIRI-C.2010.27 | |
| dc.date.accessioned | 2016-12-23T11:00:41Z | |
| dc.date.available | 2016-12-23T11:00:41Z | |
| dc.date.issued | 2010 | |
| dc.description | 4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion, SSIRI-C 2010; Singapore; Singapore; 9 June 2010 through 11 June 2010 | en_US |
| dc.description.abstract | Timed Automata is an extension to the automata-theoretic approach for the modeling of real time systems that introduces time into the classical automata. It has become an important research area in both the context of formal languages and modeling and verification of real time systems since it was proposed by Alur and Dill in the early nineties. Timed automata proposes an efficient model checking method for verification real time systems having mature and efficient automatic verification tools. One of the application areas of timed automata is the verification of security protocols which are known to be time sensitive. This study aims to make use of timed automata as a verification tool for security protocols and gives a case study on the initial part of the Neuman- Stubblebine Repeated Authentication Protocol. © 2010 IEEE. | en_US |
| dc.identifier.citation | Koltuksuz, A, Külahçıoğlu, B., and Özkan, M. (2010). Utilization of timed automata as a verification tool for security protocols. Paper presented at the 4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion. doi:10.1109/SSIRI-C.2010.27 | en_US |
| dc.identifier.doi | 10.1109/SSIRI-C.2010.27 | en_US |
| dc.identifier.doi | 10.1109/SSIRI-C.2010.27 | |
| dc.identifier.isbn | 9780769540870 | |
| dc.identifier.scopus | 2-s2.0-77956120549 | |
| dc.identifier.uri | http://doi.org/10.1109/SSIRI-C.2010.27 | |
| dc.identifier.uri | https://hdl.handle.net/11147/2664 | |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
| dc.relation.ispartof | 4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion, SSIRI-C 2010 | en_US |
| dc.rights | info:eu-repo/semantics/openAccess | en_US |
| dc.subject | Network security | en_US |
| dc.subject | Timed automata | en_US |
| dc.subject | Model checking | en_US |
| dc.subject | Security protocol verification | en_US |
| dc.title | Utilization of Timed Automata as a Verification Tool for Security Protocols | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication | |
| gdc.author.institutional | Külahçıoğlu, Burcu | |
| gdc.author.institutional | Özkan, Murat | |
| gdc.bip.impulseclass | C5 | |
| gdc.bip.influenceclass | C5 | |
| gdc.bip.popularityclass | C5 | |
| gdc.coar.access | open access | |
| gdc.coar.type | text::conference output | |
| gdc.collaboration.industrial | false | |
| gdc.description.department | İzmir Institute of Technology. Computer Engineering | en_US |
| gdc.description.endpage | 93 | en_US |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | N/A | |
| gdc.description.startpage | 86 | en_US |
| gdc.description.wosquality | N/A | |
| gdc.identifier.openalex | W2123832623 | |
| gdc.index.type | Scopus | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 0.0 | |
| gdc.oaire.influence | 2.954382E-9 | |
| gdc.oaire.isgreen | true | |
| gdc.oaire.keywords | Security protocol verification | |
| gdc.oaire.keywords | Model checking | |
| gdc.oaire.keywords | Network security | |
| gdc.oaire.keywords | Timed automata | |
| gdc.oaire.popularity | 2.4486515E-9 | |
| gdc.oaire.publicfunded | false | |
| gdc.oaire.sciencefields | 0202 electrical engineering, electronic engineering, information engineering | |
| gdc.oaire.sciencefields | 0102 computer and information sciences | |
| gdc.oaire.sciencefields | 02 engineering and technology | |
| gdc.oaire.sciencefields | 01 natural sciences | |
| gdc.openalex.collaboration | National | |
| gdc.openalex.fwci | 0.0 | |
| gdc.openalex.normalizedpercentile | 0.17 | |
| gdc.opencitations.count | 5 | |
| gdc.plumx.crossrefcites | 3 | |
| gdc.plumx.mendeley | 11 | |
| gdc.plumx.scopuscites | 7 | |
| gdc.scopus.citedcount | 7 | |
| local.message.claim | 2022-06-14T16:22:01.541+0300 | * |
| local.message.claim | |rp01152 | * |
| local.message.claim | |submit_approve | * |
| local.message.claim | |dc_contributor_author | * |
| local.message.claim | |None | * |
| relation.isAuthorOfPublication.latestForDiscovery | 0c5a8e7d-d666-4b2e-bb7c-66b3d41b72c4 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | 9af2b05f-28ac-4014-8abe-a4dfe192da5e |
