메뉴 건너뛰기




Volumn 14, Issue 1, 2002, Pages 2-34

On the use of data refinement in the development of secure communications systems

Author keywords

Action systems; B; CSP; Refinement; Security protocols

Indexed keywords

COMMUNICATION SYSTEMS; DATA TRANSFER; NETWORK PROTOCOLS; PROBABILITY; PROBLEM SOLVING; SPECIFICATIONS;

EID: 0036812203     PISSN: 09345043     EISSN: None     Source Type: Journal    
DOI: 10.1007/s001650200025     Document Type: Article
Times cited : (22)

References (30)
  • 1
    • 0003206115 scopus 로고    scopus 로고
    • Introducing dynamic constraints in B
    • [AbM98] In D. Bert, editor April
    • [AbM98] Abrial, J.-R. and Mussat, L.: Introducing dynamic constraints in B. In D. Bert, editor, Second International B Conference, April 1998.
    • (1998) Second International B Conference
    • Abrial, J.-R.1    Mussat, L.2
  • 7
    • 0003681017 scopus 로고
    • [But92] D.Phil. thesis, Programming Research Group, Oxford University
    • [But92] Butler, M.J.: A CSP Approach To Action Systems. D.Phil. thesis, Programming Research Group, Oxford University, 1992.
    • (1992) A CSP Approach To Action Systems
    • Butler, M.J.1
  • 8
    • 0030245996 scopus 로고    scopus 로고
    • Stepwise refinement of communicating systems
    • [But96] September
    • [But96] Butler, M.J.: Stepwise refinement of communicating systems. Science of Computer Programming, 27(2):139-173, September 1996.
    • (1996) Science of Computer Programming , vol.27 , Issue.2 , pp. 139-173
    • Butler, M.J.1
  • 10
    • 0011584271 scopus 로고    scopus 로고
    • csp2B: A practical approach to combining CSP and B
    • But00
    • [But00] Butler, M.J.: csp2B: a practical approach to combining CSP and B. Formal Aspects of Computing, 12:182-198, 2000.
    • (2000) Formal Aspects of Computing , vol.12 , pp. 182-198
    • Butler, M.J.1
  • 16
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Low95
    • [Low95] Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 17
    • 26444574191 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Low96
    • [Low96] Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software Concepts and Tools, 17:93-102, 1996.
    • (1996) Software Concepts and Tools , vol.17 , pp. 93-102
    • Lowe, G.1
  • 18
    • 0032684740 scopus 로고    scopus 로고
    • I/O automaton models and proofs for shared-key communications systems
    • Lyn99
    • [Lyn99] Lynch, N.: I/O automaton models and proofs for shared-key communications systems. In 12th IEEE Computer Security Foundations Workshop, 1999.
    • (1999) 12th IEEE Computer Security Foundations Workshop
    • Lynch, N.1
  • 22
    • 10644277404 scopus 로고
    • Of wp and CSP
    • [Mor90] In W.H.J. Feijen, A.J.M. van Gasteren, D. Gries and J. Misra, editors, Springer
    • [Mor90] Morgan, C.C.: Of wp and CSP. In W.H.J. Feijen, A.J.M. van Gasteren, D. Gries and J. Misra, editors, Beauty is our Business: A Birthday Salute to Edsger W. Dijkstra. Springer, 1990.
    • (1990) Beauty is our Business: A Birthday Salute to Edsger W. Dijkstra
    • Morgan, C.C.1
  • 24
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • NeS78
    • [NeS78] Needham, R. and Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Needham, R.1    Schroeder, M.2
  • 25
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • OtR87
    • [OtR87] Otway, D. and Rees, O.: Efficient and timely mutual authentication. Operating Systems Review, 21(1):8-10, 1987.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 26
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Pau98
    • [Pau98] Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 28
    • 0029484376 scopus 로고
    • Modelling and verifying key-exchange protocols using CSP and FDR
    • [Ros95b] IEEE Computer Society Press
    • [Ros95b] Roscoe, A.W.: Modelling and verifying key-exchange protocols using CSP and FDR. In Proceedings of 8th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 1995.
    • (1995) Proceedings of 8th IEEE Computer Security Foundations Workshop
    • Roscoe, A.W.1
  • 30
    • 0031374451 scopus 로고    scopus 로고
    • Action systems for security specifications
    • Sin97
    • [Sin97] Sinclair, J.: Action systems for security specifications. Journal of of Computer Security, 5:129-154, 1997.
    • (1997) Journal of of Computer Security , vol.5 , pp. 129-154
    • Sinclair, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.