메뉴 건너뛰기




Volumn 2788, Issue , 2003, Pages 116-129

Modelling and verification of layered security protocols: A bank application

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 18944394652     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39878-3_10     Document Type: Article
Times cited : (15)

References (31)
  • 2
    • 35248851568 scopus 로고    scopus 로고
    • S. Anderson, S. Bologna, and M. Felici, editors. SAFECOMP 2002 - The 21st International Conference on Computer Safety, Reliability and Security, Springer-Verlag, Berlin
    • S. Anderson, S. Bologna, and M. Felici, editors. SAFECOMP 2002 - The 21st International Conference on Computer Safety, Reliability and Security, volume 2434 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2434
  • 3
    • 27144479376 scopus 로고    scopus 로고
    • Formal methods diffusion: Past lessons and future prospects
    • F. Koornneef and M. van der Meulen, editors, Computer Safety, Reliability and Security 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, Oct.
    • R. Bloomfield, D. Craigen, F. Koob, M. Ullmann, and S. Wittmann. Formal methods diffusion: Past lessons and future prospects. In F. Koornneef and M. van der Meulen, editors, Computer Safety, Reliability and Security 19th International Conference, SAFECOMP 2000, volume 1943 of Lecture Notes in Computer Science, pages 211-226, Rotterdam, The Netherlands, Oct. 2000.
    • (2000) Lecture Notes in Computer Science , vol.1943 , pp. 211-226
    • Bloomfield, R.1    Craigen, D.2    Koob, F.3    Ullmann, M.4    Wittmann, S.5
  • 7
    • 84943343074 scopus 로고    scopus 로고
    • Security of critical systems - Management issues
    • Birmingham, 23rd-24th Oct. The Safety-Critical Systems Club and Software Reliability and Metrics Club
    • P. Daniel. Security of critical systems - management issues. In Critical Systems Conference 2001, Birmingham, 23rd-24th Oct. 2001. The Safety-Critical Systems Club and Software Reliability and Metrics Club.
    • (2001) Critical Systems Conference 2001
    • Daniel, P.1
  • 9
    • 0001449325 scopus 로고
    • Temporal and modal logic
    • Jan van Leeuwen, editor, chapter 16, Elsevier Science Publishers
    • E. Allen Emerson. Temporal and modal logic. In Jan van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B, chapter 16, pages 995-1072. Elsevier Science Publishers, 1990.
    • (1990) Handbook of Theoretical Computer Science , vol.B , pp. 995-1072
    • Allen Emerson, E.1
  • 13
    • 18444377006 scopus 로고    scopus 로고
    • Security goals: Packet trajectories and strand spaces
    • Joshua D. Guttman. Security goals: Packet trajectories and strand spaces. Lecture Notes in Computer Science, 2171:197ff, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2171
    • Guttman, J.D.1
  • 20
    • 84957697086 scopus 로고    scopus 로고
    • The new topicality of using formal models of security policy within the security engineering process
    • D. Hutter, W. Stephan, P. Traverso, and M. Ullmann, editors, Applied Formal Methods - FM-Trends 98, International Workshop on Current Trends in Applied Formal Method, Boppard, Germany, Oct. 7-9, Springer-Verlag, Berlin
    • F. Koob, M. Ullmann, and S. Wittmann. The new topicality of using formal models of security policy within the security engineering process. In D. Hutter, W. Stephan, P. Traverso, and M. Ullmann, editors, Applied Formal Methods - FM-Trends 98, International Workshop on Current Trends in Applied Formal Method, volume 1641 of Lecture Notes in Computer Science, pages 302-310, Boppard, Germany, Oct. 7-9, 1998 1999. Springer-Verlag, Berlin.
    • (1998) Lecture Notes in Computer Science , vol.1641 , pp. 302-310
    • Koob, F.1    Ullmann, M.2    Wittmann, S.3
  • 22
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR
    • Margaria and Steffen, editors, TACAS, Springer-Verlag, Berlin
    • G. Lowe. Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR. In Margaria and Steffen, editors, TACAS, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer-Verlag, Berlin, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 25
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 29
    • 0038594096 scopus 로고    scopus 로고
    • Quest: Overview over the Project
    • D. Hutter, W. Stephan, P Traverso, and M. Ullmann, editors, Springer LNCS 1641
    • O. Slotosch. Quest: Overview over the Project. In D. Hutter, W. Stephan, P Traverso, and M. Ullmann, editors, Applied Formal Methods - FM-Trends 98, pages 346-350. Springer LNCS 1641, 1998.
    • (1998) Applied Formal Methods - FM-Trends 98 , pp. 346-350
    • Slotosch, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.