메뉴 건너뛰기




Volumn 139, Issue 1, 2005, Pages 49-90

Analysing the BKE-security Protocol with μcRL

Author keywords

CRL; Model checking; Security protocol verification

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; DISTRIBUTED COMPUTER SYSTEMS; NETWORK PROTOCOLS;

EID: 27644432767     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2005.09.005     Document Type: Conference Paper
Times cited : (4)

References (36)
  • 1
    • 0021870594 scopus 로고
    • Algebra of communicating processes with abstraction
    • J.A. Bergstra, and J.W. Klop Algebra of communicating processes with abstraction Theoretical Computer Science 37 1985 77 121
    • (1985) Theoretical Computer Science , vol.37 , pp. 77-121
    • Bergstra, J.A.1    Klop, J.W.2
  • 2
    • 84937553755 scopus 로고    scopus 로고
    • State space reduction by proving confluence
    • E. Brinksma K.G. Larsen Computer Aided Verification, 14th International Conference, Proceedings CAV 2002, Copenhagen, Denmark, July 27-31, 2002
    • S. Blom, and J. van de Pol State space reduction by proving confluence E. Brinksma K.G. Larsen Computer Aided Verification, 14th International Conference, Proceedings CAV 2002, Copenhagen, Denmark, July 27-31, 2002 Lecture Notes in Computer Science 2404 2002 596 609
    • (2002) Lecture Notes in Computer Science , vol.2404 , pp. 596-609
    • Blom, S.1    Van De Pol, J.2
  • 5
    • 0003568551 scopus 로고    scopus 로고
    • A survey of authentication protocol literature
    • The University of York
    • Clark, J.A. and J.L. Jacob, A survey of authentication protocol literature, Technical Report 1.0, The University of York (1997)
    • (1997) Technical Report 1.0
    • Clark, J.A.1    Jacob, J.L.2
  • 6
    • 84981282575 scopus 로고
    • Verification tools for finite-state concurrent systems
    • J.W. de Bakker W.P. de Roever G. Rozenberg A Decade of Concurrency, Reflections and Perspectives, REX School/Symposium, Proceedings Noordwijkerhout, The Netherlands, June 1-4, 1993
    • E.M. Clarke, O. Grumberg, and D.E. Long Verification tools for finite-state concurrent systems J.W. de Bakker W.P. de Roever G. Rozenberg A Decade of Concurrency, Reflections and Perspectives, REX School/Symposium, Proceedings Noordwijkerhout, The Netherlands, June 1-4, 1993 Lecture Notes in Computer Science 803 1994 124 175
    • (1994) Lecture Notes in Computer Science , vol.803 , pp. 124-175
    • Clarke, E.M.1    Grumberg, O.2    Long, D.E.3
  • 7
    • 84863949796 scopus 로고    scopus 로고
    • Partial order reductions for security protocol verification
    • S. Graf M.I. Schwartzbach Tools and Algorithms for Construction and Analysis of Systems, 6th International Conference, TACAS 2000, Held as Part of the European Joint Conferences on the Theory and Practice of Software, Proceedings ETAPS 2000, Berlin, Germany, March 25 - April 2, 2000
    • E.M. Clarke, S. Jha, and W.R. Marrero Partial order reductions for security protocol verification S. Graf M.I. Schwartzbach Tools and Algorithms for Construction and Analysis of Systems, 6th International Conference, TACAS 2000, Held as Part of the European Joint Conferences on the Theory and Practice of Software, Proceedings ETAPS 2000, Berlin, Germany, March 25 - April 2, 2000 Lecture Notes in Computer Science 1785 2000 503 518
    • (2000) Lecture Notes in Computer Science , vol.1785 , pp. 503-518
    • Clarke, E.M.1    Jha, S.2    Marrero, W.R.3
  • 8
    • 23944490105 scopus 로고    scopus 로고
    • Checking secrecy by means of partial order reduction
    • D. Amyot A.W. Williams System Analysis and Modeling, 4th International SDL and MSCWorkshop SAM 2004, Ottawa, Canada, June 1-4, 2004, Revised Selected Papers
    • C.J.F. Cremers, and S. Mauw Checking secrecy by means of partial order reduction D. Amyot A.W. Williams System Analysis and Modeling, 4th International SDL and MSCWorkshop SAM 2004, Ottawa, Canada, June 1-4, 2004, Revised Selected Papers Lecture Notes in Computer Science 3319 2004 171 188
    • (2004) Lecture Notes in Computer Science , vol.3319 , pp. 171-188
    • Cremers, C.J.F.1    Mauw, S.2
  • 9
    • 27644487289 scopus 로고    scopus 로고
    • A tool architecture for the next generation of UPPAAL
    • Uppsala University
    • David, A., G. Behrmann, K. Larsen and W. Yi, A tool architecture for the next generation of UPPAAL, Technical report, Uppsala University (2003)
    • (2003) Technical Report
    • David, A.1    Behrmann, G.2    Larsen, K.3    Yi, W.4
  • 12
    • 0041640181 scopus 로고
    • Process algebra with guards: Combining hoare logic with process algebra
    • J.F. Groote, and A. Ponse Process algebra with guards: Combining hoare logic with process algebra Formal Aspects of Computing 6 1994 115 164
    • (1994) Formal Aspects of Computing , vol.6 , pp. 115-164
    • Groote, J.F.1    Ponse, A.2
  • 13
    • 0002278376 scopus 로고    scopus 로고
    • Algebraic process verification
    • J.A. Bergstra A. Ponse S.A. Smolka Elsevier
    • J.F. Groote, and M.A. Reniers Algebraic process verification J.A. Bergstra A. Ponse S.A. Smolka Handbook of Process Algebra 2001 Elsevier 1151 1208
    • (2001) Handbook of Process Algebra , pp. 1151-1208
    • Groote, J.F.1    Reniers, M.A.2
  • 15
    • 84956855748 scopus 로고    scopus 로고
    • Equational binary decision diagrams
    • M. Parigot A. Voronkov Logic for Programming and Automated Reasoning, 7th International Conference, Proceedings LPAR 2000, Reunion Island, France, November 11-12, 2000
    • J.F. Groote, and J. van de Pol Equational binary decision diagrams M. Parigot A. Voronkov Logic for Programming and Automated Reasoning, 7th International Conference, Proceedings LPAR 2000, Reunion Island, France, November 11-12, 2000 Lecture Notes in Computer Science 1955 2000 161 178
    • (2000) Lecture Notes in Computer Science , vol.1955 , pp. 161-178
    • Groote, J.F.1    Van De Pol, J.2
  • 16
    • 27644489290 scopus 로고    scopus 로고
    • A checker for modal formulas for processes with data
    • to appear
    • Groote, J.F. and T. Willemse, A checker for modal formulas for processes with data, Theoretical Computer Science (2005), to appear
    • (2005) Theoretical Computer Science
    • Groote, J.F.1    Willemse, T.2
  • 18
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • T. Margaria B. Steffen Tools and Algorithms for Construction and Analysis of Systems, Second International Workshop, Proceedings TACAS '96, Passau, Germany, March 27-29, 1996
    • G. Lowe Breaking and fixing the Needham-Schroeder public-key protocol using FDR T. Margaria B. Steffen Tools and Algorithms for Construction and Analysis of Systems, Second International Workshop, Proceedings TACAS '96, Passau, Germany, March 27-29, 1996 Lecture Notes in Computer Science 1055 1996 147 166
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 19
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specification
    • (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA
    • G. Lowe A hierarchy of authentication specification 10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA 1997 31 44
    • (1997) 10th Computer Security Foundations Workshop , pp. 31-44
    • Lowe, G.1
  • 20
    • 84947771504 scopus 로고
    • Regularity of BPA-systems is decidable
    • B. Jonsson J. Parrow CONCUR '94, Concurrency Theory, 5th International Conference, Proceedings Uppsala, Sweden, August 22-25, 1994
    • S. Mauw, and H. Mulder Regularity of BPA-systems is decidable B. Jonsson J. Parrow CONCUR '94, Concurrency Theory, 5th International Conference, Proceedings Uppsala, Sweden, August 22-25, 1994 Lecture Notes in Computer Science 836 1994 34 47
    • (1994) Lecture Notes in Computer Science , vol.836 , pp. 34-47
    • Mauw, S.1    Mulder, H.2
  • 22
    • 0030084918 scopus 로고    scopus 로고
    • The nrl protocol analyzer: An overview
    • C. Meadows The nrl protocol analyzer: An overview Journal of Logic Programming 26 1996 113 131
    • (1996) Journal of Logic Programming , vol.26 , pp. 113-131
    • Meadows, C.1
  • 27
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson The inductive approach to verifying cryptographic protocols Journal of Computer Security 6 1998 85 128
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 29
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D.X. Song, S. Berezin, and A. Perrig Athena: A novel approach to efficient automatic security protocol analysis Journal of Computer Security 9 2001 47 74
    • (2001) Journal of Computer Security , vol.9 , pp. 47-74
    • Song, D.X.1    Berezin, S.2    Perrig, A.3
  • 30
    • 84937554711 scopus 로고    scopus 로고
    • CVC: A cooperating validity checker
    • E. Brinksma K.G. Larsen Computer Aided Verification, 14th International Conference, Proceedings CAV 2002, Copenhagen, Denmark, July 27-31, 2002
    • A. Stump, C.W. Barrett, and D.L. Dill CVC: A cooperating validity checker E. Brinksma K.G. Larsen Computer Aided Verification, 14th International Conference, Proceedings CAV 2002, Copenhagen, Denmark, July 27-31, 2002 Lecture Notes in Computer Science 2404 2002 500 504
    • (2002) Lecture Notes in Computer Science , vol.2404 , pp. 500-504
    • Stump, A.1    Barrett, C.W.2    Dill, D.L.3
  • 32
    • 16244366401 scopus 로고    scopus 로고
    • Ph.D. thesis, Eindhoven University of Technology
    • Usenko, Y.S., "Linearization in μCRL," Ph.D. thesis, Eindhoven University of Technology (2002)
    • (2002) Linearization in μcRL
    • Usenko, Y.S.1
  • 33
    • 84947248240 scopus 로고    scopus 로고
    • JITty: A rewriter with strategy annotations
    • S. Tison Rewriting Techniques and Applications, 13th International Conference, Proceedings RTA 2002, Copenhagen, Denmark, July 22-24, 2002
    • J. van de Pol JITty: A rewriter with strategy annotations S. Tison Rewriting Techniques and Applications, 13th International Conference, Proceedings RTA 2002, Copenhagen, Denmark, July 22-24, 2002 Lecture Notes in Computer Science 2378 2002 367 370
    • (2002) Lecture Notes in Computer Science , vol.2378 , pp. 367-370
    • Van De Pol, J.1
  • 34
    • 21144434634 scopus 로고    scopus 로고
    • Modal abstractions in μcRL
    • C. Rattray S. Maharaj C. Shankland Algebraic Methodology and Software Technology, 10th International Conference, Proceedings AMAST 2004, Stirling, Scotland, UK, July 12-16, 2004
    • J. van de Pol, and M.V. Espada Modal abstractions in μCRL C. Rattray S. Maharaj C. Shankland Algebraic Methodology and Software Technology, 10th International Conference, Proceedings AMAST 2004, Stirling, Scotland, UK, July 12-16, 2004 Lecture Notes in Computer Science 3116 2004 409 425
    • (2004) Lecture Notes in Computer Science , vol.3116 , pp. 409-425
    • Van De Pol, J.1    Espada, M.V.2
  • 35
    • 0030143334 scopus 로고    scopus 로고
    • Branching time and abstraction in bisimulation semantics
    • R.J. van Glabbeek, and W.P. Weijland Branching time and abstraction in bisimulation semantics Journal of the ACM 43 1996 555 600
    • (1996) Journal of the ACM , vol.43 , pp. 555-600
    • Van Glabbeek, R.J.1    Weijland, W.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.