메뉴 건너뛰기




Volumn 3535, Issue , 2005, Pages 115-130

Towards an integrated formal analysis for security and trust

Author keywords

[No Author keywords available]

Indexed keywords

DATA PROCESSING; NETWORK PROTOCOLS; PUBLIC POLICY; SECURITY OF DATA; ACCESS CONTROL; MACHINERY; MOBILE SECURITY; NETWORK SECURITY;

EID: 26444544547     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11494881_8     Document Type: Conference Paper
Times cited : (16)

References (29)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1): 1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 26444574798 scopus 로고    scopus 로고
    • Privacy enhancing technologies, second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers
    • Springer
    • R. Dingledine and P. F. Syverson, editors. Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, volume 2482 of Lecture Notes in Computer Science. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2482
    • Dingledine, R.1    Syverson, P.F.2
  • 4
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (part i: Information flow)
    • Foundations of Security Analysis and Design
    • R. Focardi and R. Gorrieri. Classification of security properties (part i: Information flow). In Foundations of Security Analysis and Design, volume 2171 of Lecture Notes in Computer Science, pages 331-396, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 5
    • 84974597207 scopus 로고    scopus 로고
    • Non interference for the analysis of cryptographic protocols
    • Proceedings of 27th International Colloquium in Automata, Languages and Programming
    • R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proceedings of 27th International Colloquium in Automata, Languages and Programming, volume 1853 of Lectures Notes in Computer Science, pages 354-372, 2000.
    • (2000) Lectures Notes in Computer Science , vol.1853 , pp. 354-372
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 6
    • 35048815468 scopus 로고    scopus 로고
    • Classification of security properties - Part II: Network security
    • FOSAD school Lectures. Springer-Verlag
    • R. Focardi, R. Gorrieri, and F. Martinelli. Classification of security properties - Part II: Network security. In FOSAD school Lectures, volume 2946 of LNCS. Springer-Verlag, 2004.
    • (2004) LNCS , vol.2946
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 7
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach for the definition of security properties
    • Proceedings of World Congress on Formal Methods (FM'99)
    • R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proceedings of World Congress on Formal Methods (FM'99), volume 1708 of Lecture Notes in Computer Science, pages 794-813, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 11
    • 0036783876 scopus 로고    scopus 로고
    • The consensus operator for combining beliefs
    • A. Josang. The consensus operator for combining beliefs. Artif. Intell., 141(1):157-170, 2002.
    • (2002) Artif. Intell. , vol.141 , Issue.1 , pp. 157-170
    • Josang, A.1
  • 17
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham Schroeder public-key protocol using FDR
    • Proceedings of Tools and Algorithms for the Construction and the Analisys of Systems. Springer Verlag
    • G. Lowe. Breaking and fixing the Needham Schroeder public-key protocol using FDR. In Proceedings of Tools and Algorithms for the Construction and the Analisys of Systems, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 18
    • 26444504882 scopus 로고    scopus 로고
    • Towards a uniform framework for the formal analysis for security and trust
    • Technical Report IIT. A position paper has been presented at (Cambridge, UK-Ubinet 2004)
    • F. Martinelli. Towards a uniform framework for the formal analysis for security and trust. Technical Report IIT, 2004. A position paper has been presented at 2nd Workshop on Ubiquitious Networking (Cambridge, UK-Ubinet 2004).
    • (2004) 2nd Workshop on Ubiquitious Networking
    • Martinelli, F.1
  • 19
    • 0000544858 scopus 로고    scopus 로고
    • Languages for description and analysis of authentication protocols
    • P. Degano and U. Vaccaro, editors. World Scientific
    • F. Martinelli. Languages for description and analysis of authentication protocols. In P. Degano and U. Vaccaro, editors, Proceedings of 6th Italian Conference on Theoretical Computer Science, pages 304-315. World Scientific, 1998.
    • (1998) Proceedings of 6th Italian Conference on Theoretical Computer Science , pp. 304-315
    • Martinelli, F.1
  • 20
    • 84956982499 scopus 로고    scopus 로고
    • Symbolic semantics and analysis for crypto-ccs with (almost) generic inference systems
    • Proceedings of the 27th international Symposium in Mathematical Foundations of Computer Sciences(MFCS'02)
    • F. Martinelli. Symbolic semantics and analysis for crypto-ccs with (almost) generic inference systems. In Proceedings of the 27th international Symposium in Mathematical Foundations of Computer Sciences(MFCS'02), volume 2420 of LNCS, pages 519-531, 2002.
    • (2002) LNCS , vol.2420 , pp. 519-531
    • Martinelli, F.1
  • 21
    • 0037209815 scopus 로고    scopus 로고
    • Analysis of security protocols as open systems
    • F. Martinelli. Analysis of security protocols as open systems. Theoretical Computer Science, 290(1):1057-1106, 2003.
    • (2003) Theoretical Computer Science , vol.290 , Issue.1 , pp. 1057-1106
    • Martinelli, F.1
  • 23
    • 0003954103 scopus 로고
    • International Series in Computer Science. Prentice Hall
    • R. Milner. Communication and Concurrency. International Series in Computer Science. Prentice Hall, 1989.
    • (1989) Communication and Concurrency
    • Milner, R.1
  • 24
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • R. Focardi and R. Gorrieri, editors, LNCS 2171. Springer-Verlag
    • P. Samarati and S. D. C. di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag, 2001.
    • (2001) Foundations of Security Analysis and Design
    • Samarati, P.1    Di Vimercati, S.D.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.