@CONFERENCE\{IMM2005-03655, author = "M. Buchholtz", title = "Automated Analysis of Infinite Scenarios", year = "2005", booktitle = "Symposium on Trustworthy Global Computing", volume = "", series = "Lecture Notes of Computer Science", editor = "", publisher = "", organization = "", address = "", note = "To appear", url = "http://www2.compute.dtu.dk/pubdb/pubs/3655-full.html", abstract = "The security of a network protocol crucially relies on the scenario in which the protocol is deployed. This paper describes syntactic constructs for modelling network scenarios and presents an automated analysis tool, which can guarantee that security properties hold in all of the (infinitely many) instances of a scenario. The tool is based on control flow analysis of the process calculus LySa and is applied to the Bauer, Berson, and Feiertag protocol where is reveals a previously undocumented problem, which occurs in some scenarios but not in other." }