메뉴 건너뛰기




Volumn 2024, Issue , 2001, Pages 123-137

Specifying and debugging security protocols via hereditary Harrop formulas and λprolog - A case-study -

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CIRCUITS; FUNCTIONAL PROGRAMMING; LOGIC PROGRAMMING; PROGRAM DEBUGGING; RECONFIGURABLE HARDWARE; SPECIFICATION LANGUAGES; SPECIFICATIONS;

EID: 23044522745     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44716-4_8     Document Type: Conference Paper
Times cited : (4)

References (23)
  • 1
    • 0034593095 scopus 로고    scopus 로고
    • A Bottom-up semantics for Linear Logic Programs
    • M. Bozzano, G. Delzanno, and M. Martelli. A Bottom-up semantics for Linear Logic Programs. In Proc. PPDP’00, page 92-102, 2000.
    • (2000) Proc. PPDP’00 , pp. 92-102
    • Bozzano, M.1    Delzanno, G.2    Martelli, M.3
  • 2
    • 84959024706 scopus 로고    scopus 로고
    • An Effective Bottom-up Semantics for First-Order Linear Logic Programs
    • March
    • M. Bozzano, G. Delzanno, and M. Martelli.: An Effective Bottom-up Semantics for First-Order Linear Logic Programs. To appear in Proc. FLOPS 2001, March 2001.
    • (2001) Proc. FLOPS 2001
    • Bozzano, M.1    Delzanno, G.2    Martelli, M.3
  • 3
    • 0025386404 scopus 로고
    • A Logic of Authentication
    • M. Burrows, M. Abadi, R. M. Needham. A Logic of Authentication. TOCS 8(1): 18-36, 1990.
    • (1990) TOCS , vol.8 , Issue.1 , pp. 18-36
    • Burrows, M.1    Abadi, M.2    Needham, R.M.3
  • 7
    • 0003257683 scopus 로고    scopus 로고
    • Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols
    • E. Clarke, S. Jha, W. Marrero. Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols. In Proc. of PRO-COMET’98, 1998.
    • (1998) Proc. Of PRO-COMET’98
    • Clarke, E.1    Jha, S.2    Marrero, W.3
  • 8
    • 84863949796 scopus 로고    scopus 로고
    • Partial Order Reductions for Security Protocol Verification
    • LNCS 1785
    • E. Clarke, S. Jha, W. Marrero. Partial Order Reductions for Security Protocol Verification. In Proc. of TACAS 2000, pages 503-518, LNCS 1785, 2000.
    • (2000) Proc. Of TACAS 2000 , pp. 503-518
    • Clarke, E.1    Jha, S.2    Marrero, W.3
  • 11
    • 43949161369 scopus 로고
    • Logic Programming in a Fragment of Intuitionistic Linear Logic
    • J. Hodas and D. Miller. Logic Programming in a Fragment of Intuitionistic Linear Logic. Information and Computation, 110(2):327-365, 1994.
    • (1994) Information and Computation , vol.110 , Issue.2 , pp. 327-365
    • Hodas, J.1    Miller, D.2
  • 12
    • 84959024709 scopus 로고
    • A Bottom-Up Interpreter for a Higher-Order Logic Programming Language
    • LNCS
    • A. Hui Bon Hoa. A Bottom-Up Interpreter for a Higher-Order Logic Programming Language. In Proc. PLILP 1992, pages 326-340, LNCS 631, 1992.
    • (1992) Proc. PLILP 1992 , vol.631 , pp. 326-340
    • Hui Bon Hoa, A.1
  • 13
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public-key Protocol usinmg CSP and FDR
    • LNCS
    • G. Lowe. Breaking and Fixing the Needham-Schroeder Public-key Protocol usinmg CSP and FDR. In Proc. TACAS’96, page 147-166, LNCS 1055, 1996.
    • (1996) Proc. TACAS’96 , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 14
    • 84957370905 scopus 로고    scopus 로고
    • Automated Reasoning and the Verification of Security Protocols
    • LNAI
    • F. Massacci. Automated Reasoning and the Verification of Security Protocols In Proc. of TABLEAUX ‘99, pages 32-33, LNAI 1617, 1999.
    • (1999) In Proc. Of TABLEAUX ‘99 , vol.1617 , pp. 32-33
    • Massacci, F.1
  • 15
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An Overview
    • C. Meadows. The NRL Protocol Analyzer: An Overview. JLP 26(2): 113-131, 1996.
    • (1996) JLP , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 16
    • 0030703520 scopus 로고    scopus 로고
    • A Logic for Reasoning with Higher-Order Abstract Syntax
    • R. McDowell, D. Miller. A Logic for Reasoning with Higher-Order Abstract Syntax. In Proc. LICS ‘97, pages 434-445, 1997.
    • (1997) Proc. LICS ‘97 , pp. 434-445
    • McDowell, R.1    Miller, D.2
  • 17
    • 0039631145 scopus 로고
    • Lexical Scoping as Universal Quantification
    • D. Miller. Lexical Scoping as Universal Quantification. In Proc. ICLP ‘89, pages 268-283, 1989.
    • (1989) Proc. ICLP ‘89 , pp. 268-283
    • Miller, D.1
  • 18
    • 0024480570 scopus 로고
    • A Logical Analysis of Modules in Logic Programming
    • D. Miller. A Logical Analysis of Modules in Logic Programming. JLP 6(1&2): 79-108, 1989.
    • (1989) JLP , vol.6 , Issue.1-2 , pp. 79-108
    • Miller, D.1
  • 19
    • 0030247475 scopus 로고    scopus 로고
    • Forum: A Multiple-Conclusion Specification Logic
    • D. Miller. Forum: A Multiple-Conclusion Specification Logic. Theoretical Computer Science, 165(1):201-232, 1996.
    • (1996) Theoretical Computer Science , vol.165 , Issue.1 , pp. 201-232
    • Miller, D.1
  • 22
    • 84957611918 scopus 로고    scopus 로고
    • System Description: Teyjus - A Compiler and Abstract Machine Based Implementation of lambda-Prolog
    • G. Nadathur, D. J. Mitchell. System Description: Teyjus - A Compiler and Abstract Machine Based Implementation of lambda-Prolog. In Proc CADE’99, LNCS 1632, pages 287-291, 1999.
    • (1999) Proc CADE’99, LNCS , vol.1632 , pp. 287-291
    • Nadathur, G.1    Mitchell, D.J.2
  • 23
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. CACM 21(12): 993-999, 1978.
    • (1978) CACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.