Operational semantics of security protocols

C.J.F. Cremers, S. Mauw

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

36 Citations (Scopus)


Based on a concise domain analysis we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e.g. the intruder model. Further characteristics of the model are a straightforward handling of parallel execution of multiple protocols, locality of security claims, the binding of local constants to role instances, and explicitly defined initial intruder knowledge. We validate our framework by analysing the Needham-Schroeder-Lowe protocol.
Original languageEnglish
Title of host publicationScenarios : Models, Transformations and Tools
Subtitle of host publicationInternational Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised selected papers
EditorsS. Leue, T.J. Systä
Place of PublicationBerlin
Number of pages24
ISBN (Electronic)978-3-540-32032-6
ISBN (Print)3-540-26189-3, 978-3-540-26189-6
Publication statusPublished - 2005

Publication series

NameLecture Notes in Computer Science (LNCS)
ISSN (Print)0302-9743


Dive into the research topics of 'Operational semantics of security protocols'. Together they form a unique fingerprint.

Cite this