-
1
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1): 1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
26444574798
-
Privacy enhancing technologies, second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers
-
Springer
-
R. Dingledine and P. F. Syverson, editors. Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, volume 2482 of Lecture Notes in Computer Science. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2482
-
-
Dingledine, R.1
Syverson, P.F.2
-
4
-
-
84988393004
-
Classification of security properties (part i: Information flow)
-
Foundations of Security Analysis and Design
-
R. Focardi and R. Gorrieri. Classification of security properties (part i: Information flow). In Foundations of Security Analysis and Design, volume 2171 of Lecture Notes in Computer Science, pages 331-396, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
5
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
Proceedings of 27th International Colloquium in Automata, Languages and Programming
-
R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proceedings of 27th International Colloquium in Automata, Languages and Programming, volume 1853 of Lectures Notes in Computer Science, pages 354-372, 2000.
-
(2000)
Lectures Notes in Computer Science
, vol.1853
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
6
-
-
35048815468
-
Classification of security properties - Part II: Network security
-
FOSAD school Lectures. Springer-Verlag
-
R. Focardi, R. Gorrieri, and F. Martinelli. Classification of security properties - Part II: Network security. In FOSAD school Lectures, volume 2946 of LNCS. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2946
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
7
-
-
84958046259
-
A uniform approach for the definition of security properties
-
Proceedings of World Congress on Formal Methods (FM'99)
-
R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proceedings of World Congress on Formal Methods (FM'99), volume 1708 of Lecture Notes in Computer Science, pages 794-813, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1708
, pp. 794-813
-
-
Focardi, R.1
Martinelli, F.2
-
9
-
-
35048884068
-
Trust management in strand spaces: A rely-gurantee method
-
LNCS
-
J. D. Guttman, F. J. Thayer, J. A. Carlson, J. C. Herzog, J. D. Ramsdell, and B. T. Sniffen. Trust management in strand spaces: A rely-gurantee method. In Proceedings of the European Symposium on Programming (ESOP), LNCS, 2004.
-
(2004)
Proceedings of the European Symposium on Programming (ESOP)
-
-
Guttman, J.D.1
Thayer, F.J.2
Carlson, J.A.3
Herzog, J.C.4
Ramsdell, J.D.5
Sniffen, B.T.6
-
11
-
-
0036783876
-
The consensus operator for combining beliefs
-
A. Josang. The consensus operator for combining beliefs. Artif. Intell., 141(1):157-170, 2002.
-
(2002)
Artif. Intell.
, vol.141
, Issue.1
, pp. 157-170
-
-
Josang, A.1
-
13
-
-
0002132472
-
Fast, automatic checking of security protocols
-
Oakland, California
-
D. Kindred and J. M. Wing. Fast, automatic checking of security protocols. In Second USENIX Workshop on Electronic Commerce, pages 41-52, Oakland, California, 1996.
-
(1996)
Second USENIX Workshop on Electronic Commerce
, pp. 41-52
-
-
Kindred, D.1
Wing, J.M.2
-
17
-
-
0342658605
-
Breaking and fixing the Needham Schroeder public-key protocol using FDR
-
Proceedings of Tools and Algorithms for the Construction and the Analisys of Systems. Springer Verlag
-
G. Lowe. Breaking and fixing the Needham Schroeder public-key protocol using FDR. In Proceedings of Tools and Algorithms for the Construction and the Analisys of Systems, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
18
-
-
26444504882
-
Towards a uniform framework for the formal analysis for security and trust
-
Technical Report IIT. A position paper has been presented at (Cambridge, UK-Ubinet 2004)
-
F. Martinelli. Towards a uniform framework for the formal analysis for security and trust. Technical Report IIT, 2004. A position paper has been presented at 2nd Workshop on Ubiquitious Networking (Cambridge, UK-Ubinet 2004).
-
(2004)
2nd Workshop on Ubiquitious Networking
-
-
Martinelli, F.1
-
19
-
-
0000544858
-
Languages for description and analysis of authentication protocols
-
P. Degano and U. Vaccaro, editors. World Scientific
-
F. Martinelli. Languages for description and analysis of authentication protocols. In P. Degano and U. Vaccaro, editors, Proceedings of 6th Italian Conference on Theoretical Computer Science, pages 304-315. World Scientific, 1998.
-
(1998)
Proceedings of 6th Italian Conference on Theoretical Computer Science
, pp. 304-315
-
-
Martinelli, F.1
-
20
-
-
84956982499
-
Symbolic semantics and analysis for crypto-ccs with (almost) generic inference systems
-
Proceedings of the 27th international Symposium in Mathematical Foundations of Computer Sciences(MFCS'02)
-
F. Martinelli. Symbolic semantics and analysis for crypto-ccs with (almost) generic inference systems. In Proceedings of the 27th international Symposium in Mathematical Foundations of Computer Sciences(MFCS'02), volume 2420 of LNCS, pages 519-531, 2002.
-
(2002)
LNCS
, vol.2420
, pp. 519-531
-
-
Martinelli, F.1
-
21
-
-
0037209815
-
Analysis of security protocols as open systems
-
F. Martinelli. Analysis of security protocols as open systems. Theoretical Computer Science, 290(1):1057-1106, 2003.
-
(2003)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 1057-1106
-
-
Martinelli, F.1
-
23
-
-
0003954103
-
-
International Series in Computer Science. Prentice Hall
-
R. Milner. Communication and Concurrency. International Series in Computer Science. Prentice Hall, 1989.
-
(1989)
Communication and Concurrency
-
-
Milner, R.1
-
24
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
R. Focardi and R. Gorrieri, editors, LNCS 2171. Springer-Verlag
-
P. Samarati and S. D. C. di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag, 2001.
-
(2001)
Foundations of Security Analysis and Design
-
-
Samarati, P.1
Di Vimercati, S.D.C.2
-
25
-
-
0031341651
-
The arbac97 model for role-based administration of roles: Preliminary description and outline
-
ACM Press
-
R. Sandhu, V. Bhamidipati, E. Coyne, S. Ganta, and C. Youman. The arbac97 model for role-based administration of roles: preliminary description and outline. In Proceedings of the second ACM workshop on Role-based access control, pages 41-50. ACM Press, 1997.
-
(1997)
Proceedings of the Second ACM Workshop on Role-based Access Control
, pp. 41-50
-
-
Sandhu, R.1
Bhamidipati, V.2
Coyne, E.3
Ganta, S.4
Youman, C.5
-
26
-
-
0037855622
-
-
J. Vollbrecht, P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruijn, B. C. de Laat, M. Holdrege, and D. Spence. RFC 2904 AAA authorization framework. 2000.
-
(2000)
RFC 2904 AAA Authorization Framework
-
-
Vollbrecht, J.1
Calhoun, P.2
Farrell, S.3
Gommans, L.4
Gross, G.5
De Bruijn, B.6
De Laat, B.C.7
Holdrege, M.8
Spence, D.9
|