메뉴 건너뛰기




Volumn 4, Issue 1-2, 2005, Pages 17-28

An overview of the verification of SET

Author keywords

Automated reasoning; Computer security; Formal verification; Network protocols; Secure Electronic Transactions (SET)

Indexed keywords

CRYPTOGRAPHY; ELECTRONIC COMMERCE; INTERNET; NETWORK PROTOCOLS;

EID: 14844323149     PISSN: 16155262     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10207-004-0047-7     Document Type: Article
Times cited : (17)

References (44)
  • 1
    • 35248848311 scopus 로고    scopus 로고
    • Computer-assisted verification of a protocol for certified email
    • Cousot R (ed) Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Abadi M, Blanchet B (2003) Computer-assisted verification of a protocol for certified email. In: Cousot R (ed) Proc. 10th international symposium on static analysis (SAS'03), Lecture notes in computer science, vol 2694. Springer, Berlin Heidelberg New York, pp 316-335
    • (2003) Proc. 10th International Symposium on Static Analysis (SAS'03) , vol.2694 , pp. 316-335
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • Anderson R (1994) Why cryptosystems fail. Commun ACM 37(11):32-40
    • (1994) Commun. ACM , vol.37 , Issue.11 , pp. 32-40
    • Anderson, R.1
  • 7
    • 84961379291 scopus 로고    scopus 로고
    • Lazy infinite-state analysis of security protocols
    • Baumgart R (ed) Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Basin D (1999) Lazy infinite-state analysis of security protocols. In: Baumgart R (ed) Secure networking - CQRE (Secure)'99, Lecture notes in computer science, vol 1740. Springer, Berlin Heidelberg New York, pp 30-42
    • (1999) Secure Networking - CQRE (Secure)'99 , vol.1740 , pp. 30-42
    • Basin, D.1
  • 8
    • 0009956081 scopus 로고    scopus 로고
    • Maude versus Haskell: An experimental comparison in security protocol analysis
    • Futatsugi K. (ed) Elsevier (North-Holland), Amsterdam
    • Basin D, Denker G (2001) Maude versus Haskell: An experimental comparison in security protocol analysis. In: Futatsugi K (ed) Electronic notes in theoretical computer science, vol 36. Elsevier (North-Holland), Amsterdam
    • (2001) Electronic Notes in Theoretical Computer Science , vol.36
    • Basin, D.1    Denker, G.2
  • 9
    • 0037237984 scopus 로고    scopus 로고
    • Inductive verification of smart card protocols
    • Bella G (2003) Inductive verification of smart card protocols. J Comput Secur 11(1):87-132
    • (2003) J. Comput. Secur. , vol.11 , Issue.1 , pp. 87-132
    • Bella, G.1
  • 10
    • 84949979013 scopus 로고    scopus 로고
    • Making sense of specifications: The formalization of set (extended abstract)
    • Christianson B, Crispo B, Malcolm JA, Roe M (eds) Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Bella G, Massacci F, Paulson L, Tramontano P (2000) Making sense of specifications: The formalization of set (extended abstract). In: Christianson B, Crispo B, Malcolm JA, Roe M (eds) Proceedings of the 2000 workshop on security protocols. Lecture notes in computer science, vol 2133. Springer, Berlin Heidelberg New York, pp 74-81
    • (2000) Proceedings of the 2000 Workshop on Security Protocols , vol.2133 , pp. 74-81
    • Bella, G.1    Massacci, F.2    Paulson, L.3    Tramontano, P.4
  • 13
    • 84944035753 scopus 로고    scopus 로고
    • Formal verification of cardholder registration in SET
    • Cuppens F, Deswarte Y, Gollman D, Waidner M (eds) Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Bella G, Massacci F, Paulson LC, Tramontano P (2000) Formal verification of cardholder registration in SET. In: Cuppens F, Deswarte Y, Gollman D, Waidner M (eds) Computer Security - ESORICS 2000. Lecture notes in computer science, vol 1895. Springer, Berlin Heidelberg New York, pp 159-174
    • (2000) Computer Security - ESORICS 2000 , vol.1895 , pp. 159-174
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3    Tramontano, P.4
  • 14
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • Quisquater et al. [37]
    • Bella G, Paulson LC (1998) Kerberos version IV: Inductive analysis of the secrecy goals. In: Quisquater et al. [37], pp 361-375
    • (1998) , vol.37 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 16
    • 14844335469 scopus 로고    scopus 로고
    • Automatically detecting authentication limitations in commercial security protocols
    • October 1999
    • Brackin S (1999) Automatically detecting authentication limitations in commercial security protocols. In: Proc. 22nd national conference on information systems security, October 1999.http://www.arca.com/ projp_papers/brackin/Nissc99.pdf
    • (1999) Proc. 22nd National Conference on Information Systems Security
    • Brackin, S.1
  • 18
    • 85006614284 scopus 로고    scopus 로고
    • Verifying security protocols as planning in logic programming
    • Carlucci Aiello L, Massacci F (2001) Verifying security protocols as planning in logic programming. ACM Trans Comput Logic 2(4):542-580
    • (2001) ACM Trans. Comput. Logic , vol.2 , Issue.4 , pp. 542-580
    • Carlucci Aiello, L.1    Massacci, F.2
  • 19
    • 84937559950 scopus 로고    scopus 로고
    • Automated unbounded verification of security protocols
    • Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Chevalier Y, Vigneron L (2002) Automated unbounded verification of security protocols. In: Proc. international conference on computer-aided verification (CAV-02). Lecture notes in computer science, vol 2404. Springer, Berlin Heidelberg New York
    • (2002) Proc. International Conference on Computer-Aided Verification (CAV-02) , vol.2404
    • Chevalier, Y.1    Vigneron, L.2
  • 20
    • 0033718532 scopus 로고    scopus 로고
    • TAPS: A first-order verifier for cryptographic protocols
    • IEEE Press, New York
    • Cohen E (2000) TAPS: A first-order verifier for cryptographic protocols. In: Proc. 13th IEEE Computer Security Foundations Workshop. IEEE Press, New York, pp 144-158
    • (2000) Proc. 13th IEEE Computer Security Foundations Workshop , pp. 144-158
    • Cohen, E.1
  • 21
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and verifying security protocols
    • Parigot M, Voronkov A (eds), Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Jacquemard F, Rusinowitch M, Vigneron L (2000) Compiling and verifying security protocols. In: Parigot M, Voronkov A (eds) Proceedings of LPAR 2000. Lecture notes in computer science, vol 1955. Springer, Berlin Heidelberg New York, pp 131-160
    • (2000) Proceedings of LPAR 2000 , vol.1955 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 22
    • 33750230879 scopus 로고    scopus 로고
    • A sound logic for analysing electronic commerce protocols
    • Quisquater et al. [37]
    • Kessler V, Neumann H (1998) A sound logic for analysing electronic commerce protocols. In: Quisquater et al. [37]
    • (1998)
    • Kessler, V.1    Neumann, H.2
  • 23
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham - Schroeder public-key protocol using CSP and FDR
    • Margaria T, Steffen B (eds) Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Lowe G (1996) Breaking and fixing the Needham - Schroeder public-key protocol using CSP and FDR. In: Margaria T, Steffen B (eds) Proc. 2nd international workshop on tools and algorithms for the construction and analysis of systems (TACAS '96). Lecture notes in computer science, vol 1055. Springer, Berlin Heidelberg New York, pp 147-166
    • (1996) Proc. 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS '96) , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 24
    • 0035067667 scopus 로고    scopus 로고
    • Fault-preserving simplifying transformations for security protocols
    • Lowe G, Hui ML (2001) Fault-preserving simplifying transformations for security protocols. J Comput Secur 9:3-46
    • (2001) J. Comput. Secur. , vol.9 , pp. 3-46
    • Lowe, G.1    Hui, M.L.2
  • 29
    • 84940106630 scopus 로고    scopus 로고
    • Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer
    • IEEE Press, New York
    • Meadows C (1999) Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer. In: Proc. SSP-99. IEEE Press, New York, pp 216-231
    • (1999) Proc. SSP-99 , pp. 216-231
    • Meadows, C.1
  • 30
    • 0037250964 scopus 로고    scopus 로고
    • Formal methods for cryptographic protocol analysis: Emerging issues and trends
    • Meadows C (2003) Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J Select Areas Commun 21(1):44-54
    • (2003) IEEE J. Select Areas Commun. , vol.21 , Issue.1 , pp. 44-54
    • Meadows, C.1
  • 31
    • 84958035071 scopus 로고    scopus 로고
    • A formal specification of requirements for payment transactions in the SET protocol
    • Hirschfeld R (ed), Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Meadows C, Syverson P (1998) A formal specification of requirements for payment transactions in the SET protocol. In: Hirschfeld R (ed) Proc. Financial Cryptography '98, Lecture notes in computer science, vol 1465. Springer, Berlin Heidelberg New York
    • (1998) Proc. Financial Cryptography '98 , vol.1465
    • Meadows, C.1    Syverson, P.2
  • 32
    • 0003503018 scopus 로고    scopus 로고
    • Isabelle/HOL: A proof assistant for higher-order logic
    • Lecture notes in computer science, tutorial Springer, Berlin Heidelberg New York
    • Nipkow T, Paulson LC, Wenzel M (2002) Isabelle/HOL: A proof assistant for higher-order logic. Lecture notes in computer science tutorial, vol 2283. Springer, Berlin Heidelberg New York
    • (2002) , vol.2283
    • Nipkow, T.1    Paulson, L.C.2    Wenzel, M.3
  • 33
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson LC (1998) The inductive approach to verifying cryptographic protocols. J Comput Secur 6:85-128
    • (1998) J. Comput. Secur. , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 34
    • 85024252307 scopus 로고    scopus 로고
    • Inductive analysis of the internet protocol TLS
    • Paulson LC (1999) Inductive analysis of the internet protocol TLS. ACM Trans Inf Syst Secur 2(3):332-351
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.3 , pp. 332-351
    • Paulson, L.C.1
  • 35
    • 0034950756 scopus 로고    scopus 로고
    • Relations between secrets: Two formal analyses of the Yahalom protocol
    • Paulson LC (2001) Relations between secrets: Two formal analyses of the Yahalom protocol. J Comput Secur 9(3):197-216
    • (2001) J. Comput. Secur. , vol.9 , Issue.3 , pp. 197-216
    • Paulson, L.C.1
  • 38
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi R, Gorrieri R (1997) The compositional security checker: A tool for the verification of information flow security properties. IEEE Trans Softw Eng 23(9):550-571
    • (1997) IEEE Trans. Softw. Eng. , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 39
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recurive authentication protocol. A cautionary tale
    • Ryan P, Schneider S (1998) An attack on a recurive authentication protocol. A cautionary tale. Inf Process Lett 65(15):7-16
    • (1998) Inf. Process Lett. , vol.65 , Issue.15 , pp. 7-16
    • Ryan, P.1    Schneider, S.2
  • 40
    • 0003777431 scopus 로고    scopus 로고
    • The modelling and analysis of security protocols: The CSP approach
    • Addison-Wesley, Reading, MA
    • Ryan PYA, Schneider SA (2000) The modelling and analysis of security protocols: The CSP approach. Addison-Wesley, Reading, MA
    • (2000)
    • Ryan, P.Y.A.1    Schneider, S.A.2
  • 41
    • 0000937825 scopus 로고    scopus 로고
    • Verifying authentication protocols in CSP
    • Schneider S (1998) Verifying authentication protocols in CSP. IEEE Trans Softw Eng 24(9):741-758
    • (1998) IEEE Trans. Softw. Eng. , vol.24 , Issue.9 , pp. 741-758
    • Schneider, S.1
  • 43
    • 0003007912 scopus 로고    scopus 로고
    • Athena: An automatic checker for security protocol analysis
    • IEEE Press, New York
    • Song D (1999) Athena: An automatic checker for security protocol analysis. In: Proc. 12th IEEE Computer Security Foundations Workshop. IEEE Press, New York
    • (1999) Proc. 12th IEEE Computer Security Foundations Workshop
    • Song, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.