@CONFERENCE\{IMM2006-05052, author = "Y. Zhang and H. R. Nielson", title = "Analyzing Security Protocols in Hierarchical Networks", year = "2006", month = "sep", keywords = "Formal methods, static analysis, security protocols, network attacker", pages = "430-445", booktitle = "4th International Symposium, {ATVA} 2006, Beijing, China", volume = "4218", series = "LNCS", editor = "Graf, Susanne; Zhang, Wenhui", publisher = "Springer", organization = "", address = "", url = "http://www.springerlink.com/content/4577410151478u6x/?p=f5990ffb25f84cadb4596620bb2fc88d&pi=5", abstract = "Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series of experiments we have conducted.", isbn_issn = "0302-9743" }