Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/3046
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Aytaç, İsmail Sıtkı | en |
dc.contributor.author | Külahçıoğlu, Burcu | - |
dc.date.accessioned | 2014-07-22T13:50:47Z | - |
dc.date.available | 2014-07-22T13:50:47Z | - |
dc.date.issued | 2010 | en |
dc.identifier.uri | http://hdl.handle.net/11147/3046 | - |
dc.description | Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010 | en |
dc.description | Includes bibliographical references (leaves: 85-92) | en |
dc.description | Text in English; Abstract: Turkish and English | en |
dc.description | xi, 92 leaves | en |
dc.description.abstract | Timed Automata is an extension to the automata-theoretic approach to the modeling of real time systems that introduces time into the classical automata. Since it has been first proposed by Alur and Dill in the early nineties, it has become an important research area and been widely studied in both the context of formal languages and modeling and verification of real time systems. Timed automata use dense time modeling, allowing efficient model checking of time-sensitive systems whose correct functioning depend on the timing properties. One of these application areas is the verification of security protocols. This thesis aims to study the timed automata model and utilize it as a verification tool for security protocols. As a case study, the Neuman-Stubblebine Repeated Authentication Protocol is modeled and verified employing the time-sensitive properties in the model. The flaws of the protocol are analyzed and it is commented on the benefits and challenges of the model. | en |
dc.language.iso | en | en_US |
dc.publisher | Izmir Institute of Technology | en |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject.lcsh | Real-time control | en |
dc.subject.lcsh | Machine theory | en |
dc.title | Utilization of timed automata as a verification tool for real-time security protocols | en_US |
dc.type | Master Thesis | en_US |
dc.institutionauthor | Külahçıoğlu, Burcu | - |
dc.department | Thesis (Master)--İzmir Institute of Technology, Computer Engineering | en_US |
dc.relation.publicationcategory | Tez | en_US |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Master Thesis | - |
Appears in Collections: | Master Degree / Yüksek Lisans Tezleri |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
T000178.pdf | MasterThesis | 2.29 MB | Adobe PDF | View/Open |
CORE Recommender
Page view(s)
230
checked on Nov 18, 2024
Download(s)
152
checked on Nov 18, 2024
Google ScholarTM
Check
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.