|Title||Suitability of a Classical Analysis Method for E-Commerce Protocols|
|Publication Type||Conference Paper|
|Year of Publication||2001|
|Authors||S. Gurgens, and J. Lopez|
|Conference Name||IV International Information Security Conference (ISC’01)|
|Conference Location||Malaga, Spain|
We present the adaptation of our model for the validation ofkey distribution and authentication protocols to address speci c needsof protocols for electronic commerce. The two models defer in both thethreat scenario and in the formalization. We demonstrate the suitabilityof our adaptation by analyzing a speci c version of the Internet BillingServer protocol introduced by Carnegie Mellon University. Our analysisshows that, while the security properties a key distribution or authenticationprotocol shall provide are well understood, it is often not clearwhat properties an electronic commerce protocol can or shall provide.Our methods rely on automatic theorem proving tools. Speci cally, weused Øtter", an automatic theorem proving software developed at ArgonneNational Laboratories.
Suitability of a Classical Analysis Method for E-Commerce Protocols