Verified reference implementations of WS-security protocols

被引:0
|
作者
Bhargavan, Karthikeyan
Fournet, Cedric
Gordon, Andrew D.
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We describe a new reference implementation of the web services security specifications. The implementation is structured as a library in the functional programming language F#. Applications written using this library can interoperate with other compliant web services, such as those written using Microsoft WSE and WCF frameworks. Moreover, the security of such applications can be automatically verified by translating them to the applied pi calculus and using an automated theorem prover. We illustrate the use of our reference implementation through examples drawn from the sample applications included with WSE and WCF. We formally verify their security properties. We also experimentally evaluate their interoperability and performance.
引用
收藏
页码:88 / 106
页数:19
相关论文
共 50 条
  • [41] Formally sound implementations of security protocols with Java']JavaSPI
    Sisto, Riccardo
    Copet, Piergiuseppe Bettassa
    Avalle, Matteo
    Pironti, Alfredo
    FORMAL ASPECTS OF COMPUTING, 2018, 30 (02) : 279 - 317
  • [42] AnBx: Automatic generation and verification of security protocols implementations
    School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom
    Lect. Notes Comput. Sci., (156-173):
  • [43] An analysis of conformance issues in implementations of standardized security protocols
    Izquierdo, Antonio
    Sierra, Jose M.
    Torres, Joaquin
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 246 - 251
  • [44] AnBx: Automatic Generation and Verification of Security Protocols Implementations
    Modesti, Paolo
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 156 - 173
  • [45] 基于WS-Security的电子商务安全支付系统研究
    赵亮
    时代金融, 2016, (36) : 339 - 340
  • [46] 基于WS-Security的Web Service模型的安全性实现
    孙延鹏
    吾守尔·斯拉木
    傅蓉
    计算机应用与软件, 2005, (05) : 30 - 32+143
  • [47] Introduction to the special session on wireless protocols security & hardware implementations
    Sklavos, N
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 757 - 758
  • [48] Sound Verification of Security Protocols: From Design to Interoperable Implementations
    Arquint, Linard
    Wolf, Felix A.
    Lallemand, Joseph
    Sasse, Ralf
    Sprenger, Christoph
    Wiesner, Sven N.
    Basin, David
    Mueller, Peter
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1077 - 1093
  • [49] Cryptographically Verified Implementations for TLS
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Corin, Ricardo
    Zalinescu, Eugen
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 459 - 468
  • [50] Verified Cryptographic Implementations for TLS
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Corin, Ricardo
    Zalinescu, Eugen
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (01)