메뉴 건너뛰기




Volumn 291, Issue 3, 2003, Pages 223-283

A new logic for electronic commerce protocols

Author keywords

Authentication; Cryptographic protocols; Denotational semantics; E commerce protocols; Good atomicity; Logic; Money atomicity; Secrecy; Tableau based proof system

Indexed keywords

CRYPTOGRAPHY; FORMAL LOGIC; NETWORK PROTOCOLS; SEMANTICS;

EID: 0037421015     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0304-3975(02)00364-X     Document Type: Conference Paper
Times cited : (33)

References (59)
  • 5
    • 0029711237 scopus 로고    scopus 로고
    • An approach to the formal verification of cryptographic protocols
    • New Delhi, India, New York: ACM Press
    • Bolignano D. An approach to the formal verification of cryptographic protocols. Proc. 3rd ACM Conf. on Computer and Communication Security, CCS'96, New Delhi, India. 1996;106-118 ACM Press, New York.
    • (1996) Proc. 3rd ACM Conf. on Computer and Communication Security, CCS'96 , pp. 106-118
    • Bolignano, D.1
  • 6
    • 0027612025 scopus 로고
    • Security architectures using formal methods
    • Boyd C. 'Security architectures using formal methods. J. Select. Areas Commun. 11(5):1990;694-701.
    • (1990) J. Select. Areas Commun. , vol.11 , Issue.5 , pp. 694-701
    • Boyd, C.1
  • 7
    • 84896813792 scopus 로고
    • A framework for authentication
    • Proc. European Symp. on Research in Computer Security, ESORICS 92, Berlin: Springer
    • C. Boyd C. A framework for authentication. Proc. European Symp. on Research in Computer Security, ESORICS 92, Lecture Notes in Computer Science. Vol. 648:1992;273-292 Springer, Berlin.
    • (1992) Lecture Notes in Computer Science , vol.648 , pp. 273-292
    • Boyd, C.1
  • 14
    • 0025494721 scopus 로고
    • Tableau-based model checking in the propositional mu-calculus
    • Cleaveland R. Tableau-based model checking in the propositional mu-calculus. Acta Inform. 27(8):1990;725-747.
    • (1990) Acta Inform. , vol.27 , Issue.8 , pp. 725-747
    • Cleaveland, R.1
  • 16
    • 84957366356 scopus 로고    scopus 로고
    • The murphi verification system
    • Rajeev Alur, A. Henzinger Thomas, Proc. 8th Internat. Conf. on Computer Aided Verification CAV, New Brunswick, NJ, USA: Springer
    • Dill D.L. The murphi verification system. Alur Rajeev, A. Henzinger Thomas Proc. 8th Internat. Conf. on Computer Aided Verification CAV, Lecture Notes in Computer Science. Vol. 1102:1996;390-393 Springer, New Brunswick, NJ, USA.
    • (1996) Lecture Notes in Computer Science , vol.1102 , pp. 390-393
    • Dill, D.L.1
  • 18
    • 0025771853 scopus 로고
    • Applying a formal analysis technique to the CCITT X.509 Strong two-way authentication protocol
    • Gaarder K., Snekkenes E. Applying a formal analysis technique to the CCITT X.509 Strong two-way authentication protocol. J. Cryptol. 3(2):1991;81-98.
    • (1991) J. Cryptol. , vol.3 , Issue.2 , pp. 81-98
    • Gaarder, K.1    Snekkenes, E.2
  • 22
    • 0029713154 scopus 로고    scopus 로고
    • What do we mean by entity authentication
    • Silver Spring, MD: IEEE Computer Society Press
    • Gollman D. What do we mean by entity authentication. Proc. 1996 IEEE Symp. on Research in Security and Privacy. 1996;46-54 IEEE Computer Society Press, Silver Spring, MD.
    • (1996) Proc. 1996 IEEE Symp. on Research in Security and Privacy , pp. 46-54
    • Gollman, D.1
  • 23
    • 0025023289 scopus 로고
    • Reasoning about belief in cryptographic protocols
    • D. Cooper, & T. Lunt. Silver Spring, MD: IEEE Computer Society Press
    • Gong L., Needham R., Yahalom R. Reasoning about belief in cryptographic protocols. Cooper D., Lunt T. Proc. 1990 IEEE Symp. on Research in Security and Privacy. 1990;234-248 IEEE Computer Society Press, Silver Spring, MD.
    • (1990) Proc. 1990 IEEE Symp. on Research in Security and Privacy , pp. 234-248
    • Gong, L.1    Needham, R.2    Yahalom, R.3
  • 24
    • 9444219752 scopus 로고    scopus 로고
    • Proof theory and automated deduction
    • Dordrecht: Kluwer Academic Publishers
    • Goubault-Larrecq J., Mackie I. Proof Theory and Automated Deduction. Applied Logic Series. Vol. 6:1997;Kluwer Academic Publishers, Dordrecht.
    • (1997) Applied Logic Series , vol.6
    • Goubault-Larrecq, J.1    Mackie, I.2
  • 27
    • 0023248072 scopus 로고
    • Using formal verification techniques to analyze encryption protocols
    • Silver Spring, MD: IEEE Computer Society Press
    • Kemmerer R.A. Using formal verification techniques to analyze encryption protocols. Proc. 1987 IEEE Symp. on Research in Security and Privacy. 1987;134-139 IEEE Computer Society Press, Silver Spring, MD.
    • (1987) Proc. 1987 IEEE Symp. on Research in Security and Privacy , pp. 134-139
    • Kemmerer, R.A.1
  • 28
    • 0024665744 scopus 로고
    • Analyzing encryption protocols using formal verification techniques
    • Kemmerer R.A. Analyzing encryption protocols using formal verification techniques. IEEE J. Select. Areas Commun. 7(4):1989;448-457.
    • (1989) IEEE J. Select. Areas Commun. , vol.7 , Issue.4 , pp. 448-457
    • Kemmerer, R.A.1
  • 29
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Kemmerer R., Meadows C., Millen J. Three systems for cryptographic protocol analysis. J. Cryptol. 7(2):1994;79-130.
    • (1994) J. Cryptol. , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 30
    • 0042664779 scopus 로고
    • Authentication in distributed systems: A bibliography
    • Liebl A. Authentication in distributed systems. a bibliography Oper. Systems Rev. 27(4):1993;122-136.
    • (1993) Oper. Systems Rev. , vol.27 , Issue.4 , pp. 122-136
    • Liebl, A.1
  • 31
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public key authentication protocol
    • Lowe G. An attack on the Needham-Schroeder public key authentication protocol. Inform. Process. Lett. 56(3):1995;131-136.
    • (1995) Inform. Process. Lett. , vol.56 , Issue.3 , pp. 131-136
    • Lowe, G.1
  • 35
    • 85056648637 scopus 로고
    • Towards the formal analysis of security protocols
    • Silver Spring, MD: IEEE Computer Society Press
    • Mao W., Boyd C. Towards the formal analysis of security protocols. Proc. Computer Security Foundations Workshop VI. 1993;147-158 IEEE Computer Society Press, Silver Spring, MD.
    • (1993) Proc. Computer Security Foundations Workshop VI , pp. 147-158
    • Mao, W.1    Boyd, C.2
  • 36
    • 84955602379 scopus 로고
    • Formal verification of cryptographic protocols: A survey
    • ASIACRYPT: Advances in Cryptology - ASIACRYPT: Internat. Conf. on the Theory and Application of Cryptology, Springer, Berlin
    • C. Meadows, Formal verification of cryptographic protocols: A survey, in: ASIACRYPT: Advances in Cryptology - ASIACRYPT: Internat. Conf. on the Theory and Application of Cryptology, Lecture Notes in Computer Science, Vol. 917, Springer, Berlin, 1994, pp. 133-150.
    • (1994) Lecture Notes in Computer Science , vol.917 , pp. 133-150
    • Meadows, C.1
  • 37
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows C. The NRL protocol analyzer: an overview. J. Logic Programming. 26:1996;113-131.
    • (1996) J. Logic Programming , vol.26 , pp. 113-131
    • Meadows, C.1
  • 38
    • 0003604327 scopus 로고
    • Technical Report, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh
    • R. Milner, The polyadic π -calculus: A tutorial, Technical Report, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, 1991.
    • (1991) The polyadic π -calculus: A tutorial
    • Milner, R.1
  • 39
    • 0004181456 scopus 로고
    • Technical Report, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh
    • R. Milner, J. Parrow, D. Walker, A calculus of mobile processes, Technical Report, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, 1989.
    • (1989) A calculus of mobile processes
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 40
    • 0002521052 scopus 로고
    • A calculus of mobile processes (Parts I and II)
    • Milner R., Parrow J., Walker D. A calculus of mobile processes (Parts I and II). Inform. Comput. 100:1992;1-77.
    • (1992) Inform. Comput. , vol.100 , pp. 1-77
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 41
    • 0030705405 scopus 로고    scopus 로고
    • Automated analysis of cryptographic protocols using murphi
    • Silver Spring, MD: IEEE Computer Society Press
    • Mitchell J.C., Mitchell M., Stern U. Automated analysis of cryptographic protocols using murphi. Proc. 1997 IEEE Symp. on Security and Privacy. 1997;141-153 IEEE Computer Society Press, Silver Spring, MD.
    • (1997) Proc. 1997 IEEE Symp. on Security and Privacy , pp. 141-153
    • Mitchell, J.C.1    Mitchell, M.2    Stern, U.3
  • 43
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Comput. Security. 6:1998;85-128.
    • (1998) J. Comput. Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 44
    • 0029713842 scopus 로고    scopus 로고
    • Intentional specifications of security protocols
    • Silver Spring, MD: IEEE Computer Society Press
    • Roscoe A.W. Intentional specifications of security protocols. Proc. 9th IEEE Computer Security Foundations Workshop. 1996;28-38 IEEE Computer Society Press, Silver Spring, MD.
    • (1996) Proc. 9th IEEE Computer Security Foundations Workshop , pp. 28-38
    • Roscoe, A.W.1
  • 46
    • 23544459288 scopus 로고
    • Technical Report No. 93-7, Internal Draft, Center for Information Technology Integration, University of Michigan, MI
    • A.D. Rubin, P. Honeyman, Formal methods for the analysis of authentication protocols, Technical Report No. 93-7, Internal Draft, Center for Information Technology Integration, University of Michigan, MI, 1993.
    • (1993) Formal methods for the analysis of authentication protocols
    • Rubin, A.D.1    Honeyman, P.2
  • 47
    • 0029721645 scopus 로고    scopus 로고
    • Security properties and CSP
    • Silver Spring, MD: IEEE Computer Society Press
    • Schneider S. Security properties and CSP. Proc. 1996 IEEE Symp. on Security and Privacy. 1996;174-187 IEEE Computer Society Press, Silver Spring, MD.
    • (1996) Proc. 1996 IEEE Symp. on Security and Privacy , pp. 174-187
    • Schneider, S.1
  • 50
    • 0003432553 scopus 로고
    • Ph.D. Thesis, Faculty of Mathematics and Natural Sciences, University of Oslo, Norwegian Defense Research Establishment, P.O. Box 25, N-2007, Kjeller, Norway
    • E. Snekkenes, Formal specification and analysis of cryptographic protocols, Ph.D. Thesis, Faculty of Mathematics and Natural Sciences, University of Oslo, Norwegian Defense Research Establishment, P.O. Box 25, N-2007, Kjeller, Norway, 1995.
    • (1995) Formal specification and analysis of cryptographic protocols
    • Snekkenes, E.1
  • 51
    • 0026153654 scopus 로고
    • The use of logic in the analysis of cryptographic protocols
    • T.F. Lunt, & J. McLean. Silver Spring, MD: IEEE Computer Society Press
    • Syverson P. The use of logic in the analysis of cryptographic protocols. Lunt T.F., McLean J. Proc. 1991 IEEE Symp. on Security and Privacy. 1991;156-170 IEEE Computer Society Press, Silver Spring, MD.
    • (1991) Proc. 1991 IEEE Symp. on Security and Privacy , pp. 156-170
    • Syverson, P.1
  • 52
    • 84974755213 scopus 로고
    • Knowledge, belief, and semantics in the analysis of cryptographic protocols
    • Syverson P. Knowledge, belief, and semantics in the analysis of cryptographic protocols. J. Comput. Security. 1(3):1992;317-334.
    • (1992) J. Comput. Security , vol.1 , Issue.3 , pp. 317-334
    • Syverson, P.1
  • 53
    • 0001937830 scopus 로고    scopus 로고
    • A formal language for cryptographic protocol requirements
    • Syverson P., Meadows C. A formal language for cryptographic protocol requirements. Designs, Codes Cryptography. 7(1/2):1996;27-59.
    • (1996) Designs, Codes Cryptography , vol.7 , Issue.1-2 , pp. 27-59
    • Syverson, P.1    Meadows, C.2
  • 55
    • 84972541021 scopus 로고
    • A lattice-theoretical fixpoint theorem and its applications
    • Tarski A. A lattice-theoretical fixpoint theorem and its applications. Pacific J. Math. 5:1955;285-309.
    • (1955) Pacific J. Math. , vol.5 , pp. 285-309
    • Tarski, A.1
  • 56
    • 0011996468 scopus 로고    scopus 로고
    • The commission of the European Communities CEC DG-XIII, Security Investigation Final Report, Technical Report No. S2011/7000/D010 7000 1000, CEC, 1993
    • The commission of the European Communities CEC DG-XIII, Security Investigation Final Report, Technical Report No. S2011/7000/D010 7000 1000, CEC, 1993.
  • 58
    • 0024936551 scopus 로고
    • Use of formal techniques in the specification of authentication protocols
    • Varadharajan V. Use of formal techniques in the specification of authentication protocols. Comput. Standards Interfaces. 9:1990;203-215.
    • (1990) Comput. Standards Interfaces , vol.9 , pp. 203-215
    • Varadharajan, V.1
  • 59
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • Woo T.Y.C., Lam S.S. A lesson on authentication protocol design. Oper. Systems Rev. 28:1994;24-37.
    • (1994) Oper. Systems Rev. , vol.28 , pp. 24-37
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.