Introduction / 1: |
What Is Security Protocol? / 1.1: |
Needs of Formal Analysis for Secure Transaction Protocols / 1.2: |
Formal Methods and Related Areas / 1.3: |
Emerging Issues and Trends / 1.4: |
A Brief Discussion on the Chapters / 1.5: |
Summary / 1.6: |
Overview of Security Protocol Analysis / 2: |
The Formalism / 2.1: |
Basic Notations and Terminology / 2.1.1: |
Inference Rules / 2.1.2: |
Security Protocols / 2.2: |
SET Protocol / 2.2.1: |
Netbill Protocol / 2.2.2: |
Security Services / 2.2.3: |
Principles of Cryptography / 2.2.4: |
Threats in Security Protocols / 2.2.5: |
Research into Analysis of Security Protocols / 2.3: |
A Discussion of Formal Methods and Security Protocols / 2.3.1: |
A Brief Introduction to Protocol Abstraction / 2.3.2: |
A Classification of Approaches for Protocol Analysis / 2.3.3: |
Attack-Construction Approach / 2.4: |
Approaches by Dolev and Yao / 2.4.1: |
NRL Protocol Analyser / 2.4.2: |
Inference-Construction Approach / 2.5: |
BAN Logic / 2.5.1: |
Extensions to BAN Logic / 2.5.2: |
Proof-Construction Approach / 2.6: |
Approaches Using Formal Tools and Specification Languages / 2.7: |
Formal Analysis of Secure Transaction Protocols / 2.8: |
Research into Verifying Electronic Transaction Protocols / 3.1: |
Formalism for Protocol Analysis Using Process Calculi / 3.2.1: |
Formal Analysis Using an Observational Transition System / 3.2.2: |
Formal Analysis of Card-Based Payment Systems in Mobile Devices / 3.2.3: |
A Computational Model / 3.3: |
Basic Terms and Statements / 3.4: |
Logical Framework and Statement of ENDL / 3.5: |
Axiom / 3.5.1: |
Inference Format / 3.5.2: |
Verification Instances of Security Protocols in ENDL / 3.5.4: |
Model Checking in Security Protocol Analysis / 3.6: |
An Overview of Model Checking in Analysing E-Commerce Protocols / 4.1: |
Model Checking for Failure Analysis of Protocols / 4.1.1: |
Automatic Analysis of E-commerce Protocols Using UML / 4.1.2: |
An ENDL-Based Verification Model / 4.2: |
Components / 4.2.1: |
Designing the Model / 4.2.2: |
Handling the Knowledge and Facts / 4.2.3: |
Recognition / 4.2.4: |
Comparison with Theorem Proving / 4.3: |
Discussion / 4.4: |
Uncertainty Issues in Secure Messages / 4.5: |
Estimation of Inconsistency of Secure Messages / 5.1: |
Related Work / 5.2.1: |
Semantics Description / 5.2.2: |
Measuring Inconsistency in Secure Messages / 5.2.3: |
Examples of Measuring Inconsistency / 5.2.4: |
Experiments / 5.2.5: |
Integration of Conflicting Beliefs in Secure Messages / 5.3: |
Basic Concepts / 5.3.1: |
Handling Inconsistent Beliefs in Secure Messages / 5.3.3: |
Applications of Data Mining in Protocol Analysis / 5.3.4: |
Association Rule Mining for Inconsistent Secure Messages / 6.1: |
The Basics of Association Rule Mining / 6.4.1: |
Data Preparation / 6.4.2: |
Identifying Association Rules of Interest / 6.4.3: |
Algorithms and Experiments / 6.5: |
Algorithms / 6.5.1: |
Detection Models of Collusion Attacks / 6.5.2: |
Identification of Frequent Patterns for Collusion Attack Detection / 7.1: |
A Framework to Detect Collusion Attacks / 7.3.1: |
Dealing with Knowledge and Facts / 7.3.3: |
A Case Study / 7.3.4: |
Estimation of the Probability of Collusion Attacks / 7.4: |
Motivations / 7.4.1: |
Preliminaries / 7.4.2: |
Identifying Collusion Attack Using Bayesian Network / 7.4.3: |
Conclusion and Future Works / 7.4.4: |
Conclusion / 8.1: |
Future Work / 8.2: |
References |
Index |
Introduction / 1: |
What Is Security Protocol? / 1.1: |
Needs of Formal Analysis for Secure Transaction Protocols / 1.2: |
Formal Methods and Related Areas / 1.3: |
Emerging Issues and Trends / 1.4: |
A Brief Discussion on the Chapters / 1.5: |