Utilization of timed automata as a verification tool for security protocols
| dc.contributor.author | Ahmet Hasan Koltuksuz | |
| dc.contributor.author | Burcu Külahçioǧlu | |
| dc.contributor.author | Murat Ozkan | |
| dc.contributor.author | Kulahcioglu, Burcu | |
| dc.contributor.author | Ozkan, Murat | |
| dc.contributor.author | Koltuksuz, Ahmet | |
| dc.date.accessioned | 2025-10-06T17:53:09Z | |
| dc.date.issued | 2010 | |
| dc.description.abstract | Timed Automata is an extension to the automata-theoretic approach for the modeling of real time systems that introduces time into the classical automata. It has become an important research area in both the context of formal languages and modeling and verification of real time systems since it was proposed by Alur and Dill in the early nineties. Timed automata proposes an efficient model checking method for verification real time systems having mature and efficient automatic verification tools. One of the application areas of timed automata is the verification of security protocols which are known to be time sensitive. This study aims to make use of timed automata as a verification tool for security protocols and gives a case study on the initial part of the Neuman- Stubblebine Repeated Authentication Protocol. © 2010 IEEE. © 2010 Elsevier B.V. All rights reserved. | |
| dc.description.sponsorship | National University of Singapore (NUS), Infocomm Development Authority of Singapore, Reliability Society | |
| dc.identifier.doi | 10.1109/SSIRI-C.2010.27 | |
| dc.identifier.isbn | 9780769540870 | |
| dc.identifier.scopus | 2-s2.0-77956120549 | |
| dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-77956120549&doi=10.1109%2FSSIRI-C.2010.27&partnerID=40&md5=21e21f453bc128a3dab7cafacdcd8ea8 | |
| dc.identifier.uri | https://gcris.yasar.edu.tr/handle/123456789/10281 | |
| dc.identifier.uri | https://doi.org/10.1109/SSIRI-C.2010.27 | |
| dc.language.iso | English | |
| dc.relation.ispartof | 4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion SSIRI-C 2010 | |
| dc.rights | info:eu-repo/semantics/openAccess | |
| dc.subject | Model Checking, Security Protocol Verification, Timed Automata, Application Area, Authentication Protocols, Automata-theoretic Approach, Automatic Verification Tools, Research Areas, Security Protocol Verification, Security Protocols, Timed Automata, Verification Tools, Automata Theory, Formal Languages, Interactive Computer Systems, Model Checking, Network Protocols, Real Time Systems, Software Reliability, Network Security | |
| dc.subject | Application area, Authentication protocols, Automata-theoretic approach, Automatic verification tools, Research areas, Security protocol verification, Security protocols, Timed Automata, Verification tools, Automata theory, Formal languages, Interactive computer systems, Model checking, Network protocols, Real time systems, Software reliability, Network security | |
| dc.subject | Security Protocol Verification | |
| dc.subject | Timed Automata | |
| dc.subject | Model Checking | |
| dc.title | Utilization of timed automata as a verification tool for security protocols | |
| dc.type | Conference Object | |
| dspace.entity.type | Publication | |
| gdc.author.scopusid | 13408802300 | |
| gdc.author.scopusid | 57225404680 | |
| gdc.author.scopusid | 57210290205 | |
| gdc.bip.impulseclass | C5 | |
| gdc.bip.influenceclass | C5 | |
| gdc.bip.popularityclass | C5 | |
| gdc.coar.type | text::conference output | |
| gdc.collaboration.industrial | false | |
| gdc.description.department | ||
| gdc.description.departmenttemp | [Koltuksuz A.] Department of Computer Engineering, Yasar University, Izmir, Turkey; [Kulahcioglu B.] Department of Computer Engineering, Izmir Institute of Technology, Izmir, Turkey; [Ozkan M.] Department of Computer Engineering, Izmir Institute of Technology, Izmir, Turkey | |
| gdc.description.endpage | 93 | |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | |
| gdc.description.startpage | 86 | |
| gdc.identifier.openalex | W2123832623 | |
| gdc.index.type | Scopus | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 0.0 | |
| gdc.oaire.influence | 2.7140574E-9 | |
| gdc.oaire.isgreen | true | |
| gdc.oaire.keywords | Security protocol verification | |
| gdc.oaire.keywords | Model checking | |
| gdc.oaire.keywords | Network security | |
| gdc.oaire.keywords | Timed automata | |
| gdc.oaire.popularity | 1.9378197E-9 | |
| gdc.oaire.publicfunded | false | |
| gdc.oaire.sciencefields | 0202 electrical engineering, electronic engineering, information engineering | |
| gdc.oaire.sciencefields | 0102 computer and information sciences | |
| gdc.oaire.sciencefields | 02 engineering and technology | |
| gdc.oaire.sciencefields | 01 natural sciences | |
| gdc.openalex.collaboration | National | |
| gdc.openalex.fwci | 0.0 | |
| gdc.openalex.normalizedpercentile | 0.17 | |
| gdc.opencitations.count | 5 | |
| gdc.plumx.crossrefcites | 3 | |
| gdc.plumx.mendeley | 11 | |
| gdc.plumx.scopuscites | 7 | |
| gdc.scopus.citedcount | 7 | |
| gdc.virtual.author | Koltuksuz, Ahmet Hasan | |
| oaire.citation.endPage | 93 | |
| oaire.citation.startPage | 86 | |
| person.identifier.scopus-author-id | Koltuksuz- Ahmet Hasan (13408802300), Külahçioǧlu- Burcu (57210290205), Ozkan- Murat (57225404680) | |
| relation.isAuthorOfPublication | 0a146451-eb5a-43c9-bfca-979da9ee51d7 | |
| relation.isAuthorOfPublication.latestForDiscovery | 0a146451-eb5a-43c9-bfca-979da9ee51d7 | |
| relation.isOrgUnitOfPublication | ac5ddece-c76d-476d-ab30-e4d3029dee37 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | ac5ddece-c76d-476d-ab30-e4d3029dee37 |
