메뉴 건너뛰기




Volumn , Issue , 2003, Pages 24-31

Using interval logics for temporal analysis of security protocols

Author keywords

Interval logic; Real time; Security protocols; Verification

Indexed keywords

COMPUTATION THEORY; COMPUTER SIMULATION; FORMAL LOGIC; NETWORK PROTOCOLS; REAL TIME SYSTEMS; TELECOMMUNICATION LINKS;

EID: 2642531224     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1035429.1035432     Document Type: Conference Paper
Times cited : (4)

References (23)
  • 2
    • 84947913738 scopus 로고
    • Duration calculus specification of scheduling for tasks with shared resources
    • K. Kanchanasut and J.-J. Levy, editors. Springer-Verlag
    • P. Chan and D. V. Hung. Duration calculus specification of scheduling for tasks with shared resources. In K. Kanchanasut and J.-J. Levy, editors, Asian Computing Science Conference 1995, volume 1023 of LNCS, pages 365-380. Springer-Verlag, 1995.
    • (1995) Asian Computing Science Conference 1995, Volume 1023 of LNCS , vol.1023 , pp. 365-380
    • Chan, P.1    Hung, D.V.2
  • 4
    • 0003161603 scopus 로고    scopus 로고
    • Fail-stop protocols: An approach to designing secure protocols
    • R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, editors. IEEE Computer Society
    • L. Gong and P. Syverson. Fail-stop protocols: An approach to designing secure protocols. In R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, editors, Dependable Computing for Critical Applications 5, pages 79-100. IEEE Computer Society, 1998.
    • (1998) Dependable Computing for Critical Applications , vol.5 , pp. 79-100
    • Gong, L.1    Syverson, P.2
  • 6
    • 0001540660 scopus 로고    scopus 로고
    • Duration calculus: Logical foundations
    • M. R. Hansen and Zhou Chaochen. Duration Calculus: Logical foundations. Formal Aspects of Computing, 9(3):283-330, 1997.
    • (1997) Formal Aspects of Computing , vol.9 , Issue.3 , pp. 283-330
    • Hansen, M.R.1    Chaochen, Z.2
  • 9
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial-of-service in networks
    • Mar.
    • C. Meadows. A cost-based framework for analysis of denial-of-service in networks. Journal of Computer Security, 9(1/2):143-164, Mar. 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 143-164
    • Meadows, C.1
  • 12
    • 0022020113 scopus 로고
    • A temporal logic for multilevel reasoning about hardware
    • B. Moszkowski. A temporal logic for multilevel reasoning about hardware. IEEE Computer, 18(2):10-19, 1985.
    • (1985) IEEE Computer , vol.18 , Issue.2 , pp. 10-19
    • Moszkowski, B.1
  • 14
    • 2642520506 scopus 로고    scopus 로고
    • Master's thesis, Informatics and Mathematical Modelling, Technical University of Denmark, Oct.
    • H. Pilegaard. Modelling properties of security protocols. Master's thesis, Informatics and Mathematical Modelling, Technical University of Denmark, Oct. 2002.
    • (2002) Modelling Properties of Security Protocols
    • Pilegaard, H.1
  • 15
    • 2642527843 scopus 로고    scopus 로고
    • An approach to analyzing availability properties of security protocols
    • To appear
    • H. Pilegaard, M. R. Hansen, and R. Sharp. An approach to analyzing availability properties of security protocols. Nordic Journal of Computing, 2003. To appear.
    • (2003) Nordic Journal of Computing
    • Pilegaard, H.1    Hansen, M.R.2    Sharp, R.3
  • 17
    • 2642582489 scopus 로고    scopus 로고
    • PhD thesis, Informatics and Mathematical Modelling, Technical University of Denmark
    • T. M. Rasmussen. Interval Logic - Proof Theory and Theorem Proving. PhD thesis, Informatics and Mathematical Modelling, Technical University of Denmark, 2002.
    • (2002) Interval Logic - Proof Theory and Theorem Proving
    • Rasmussen, T.M.1
  • 19
    • 0023829320 scopus 로고
    • A formal specification and verification method for the prevention of denial of service
    • IEEE, IEEE Computer Society Press, Apr.
    • C.-F. Yu and V. D. Gligor. A formal specification and verification method for the prevention of denial of service. In 1988 IEEE Symposium on Security and Privacy, Oakland, California, pages 187-202. IEEE, IEEE Computer Society Press, Apr. 1988.
    • (1988) 1988 IEEE Symposium on Security and Privacy, Oakland, California , pp. 187-202
    • Yu, C.-F.1    Gligor, V.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.