This is a Demo Server. Data inside this system is only for test purpose.
 

Utilization of timed automata as a verification tool for real-time security protocols

dc.contributor.advisor Aytaç, İsmail Sıtkı en
dc.contributor.author Külahçıoğlu, Burcu
dc.date.accessioned 2023-11-13T09:46:51Z
dc.date.available 2023-11-13T09:46:51Z
dc.date.issued 2010 en
dc.description Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010 en
dc.description Includes bibliographical references (leaves: 85-92) en
dc.description Text in English; Abstract: Turkish and English en
dc.description xi, 92 leaves en
dc.description.abstract Timed Automata is an extension to the automata-theoretic approach to the modeling of real time systems that introduces time into the classical automata. Since it has been first proposed by Alur and Dill in the early nineties, it has become an important research area and been widely studied in both the context of formal languages and modeling and verification of real time systems. Timed automata use dense time modeling, allowing efficient model checking of time-sensitive systems whose correct functioning depend on the timing properties. One of these application areas is the verification of security protocols. This thesis aims to study the timed automata model and utilize it as a verification tool for security protocols. As a case study, the Neuman-Stubblebine Repeated Authentication Protocol is modeled and verified employing the time-sensitive properties in the model. The flaws of the protocol are analyzed and it is commented on the benefits and challenges of the model. en
dc.identifier.uri http://standard-demo.gcris.com/handle/123456789/5388
dc.language.iso en en_US
dc.publisher Izmir Institute of Technology en
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject.lcsh Real-time control en
dc.subject.lcsh Machine theory en
dc.title Utilization of timed automata as a verification tool for real-time security protocols en_US
dc.type Master Thesis en_US
dspace.entity.type Publication
gdc.author.institutional Külahçıoğlu, Burcu
gdc.description.department Computer Engineering en_US
gdc.description.publicationcategory Tez en_US
gdc.oaire.accepatencedate 2010-01-01
gdc.oaire.diamondjournal false
gdc.oaire.impulse 0
gdc.oaire.influence 2.9837197E-9
gdc.oaire.influencealt 0
gdc.oaire.isgreen true
gdc.oaire.keywords Formal verification
gdc.oaire.keywords Model check
gdc.oaire.keywords Computer Engineering and Computer Science and Control
gdc.oaire.keywords Automata
gdc.oaire.keywords Security protocols
gdc.oaire.keywords Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol
gdc.oaire.popularity 6.5821576E-10
gdc.oaire.popularityalt 0.0
gdc.oaire.publicfunded false

Files

Collections