메뉴 건너뛰기




Volumn 3921 LNCS, Issue , 2006, Pages 428-445

Symbolic and cryptographic analysis of the secure WS-ReliableMessaging Scenario

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); QUALITY OF SERVICE; SECURITY SYSTEMS; SEMANTICS; STANDARDS; XML;

EID: 33745824225     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11690634_29     Document Type: Conference Paper
Times cited : (24)

References (43)
  • 1
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography: The computational soundness of formal encryption
    • LNCS 1872, Springer
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In Proc. 1st IFIP TCS, LNCS 1872, pp. 3-22. Springer, 2000.
    • (2000) Proc. 1st IFIP TCS , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 33745824225 scopus 로고    scopus 로고
    • Symbolic and cryptographic analysis of the secure WS-ReliableMessaging Scenario
    • Department of Computer Science, ETH Zurich
    • M. Backes, S. Mödersheim, B. Pfitzmann, and L. Viganò. Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario (Extended Version). Technical Report 502, Department of Computer Science, ETH Zurich, 2006. Available at www.infsec.ethz.ch.
    • (2006) Technical Report , vol.502
    • Backes, M.1    Mödersheim, S.2    Pfitzmann, B.3    Viganò, L.4
  • 4
    • 4944234643 scopus 로고    scopus 로고
    • Symmetric encryption in a simulatable Dolev-yao style cryptographic library
    • M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In Proc. 17th IEEE CSFW, 2004.
    • (2004) Proc. 17th IEEE CSFW
    • Backes, M.1    Pfitzmann, B.2
  • 5
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations (extended abstract)
    • Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003
    • M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM CCS, pp. 220-230, 2003. Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.
    • (2003) Proc. 10th ACM CCS , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 6
    • 0142250274 scopus 로고    scopus 로고
    • Symmetric authentication within a simulatable cryptographic library
    • LNCS 2808, Springer
    • M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. In Proc. 8th ESORICS, LNCS 2808, pp. 271-290. Springer, 2003.
    • (2003) Proc. 8th ESORICS , pp. 271-290
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 7
    • 35048854169 scopus 로고    scopus 로고
    • A general composition theorem for secure reactive systems
    • LNCS 2951, Springer
    • M. Backes, B. Pfitzmann, and M. Waidner. A general composition theorem for secure reactive systems. In Proc. 1st TCC, LNCS 2951, pp. 336-354. Springer, 2004.
    • (2004) Proc. 1st TCC , pp. 336-354
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 10
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • LNCS 1976, Springer
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Proc. ASIACRYPT 2000, LNCS 1976, pp. 531-545. Springer, 2000.
    • (2000) Proc. ASIACRYPT 2000 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 11
    • 84937429718 scopus 로고    scopus 로고
    • Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient constructions
    • LNCS 1976, Springer
    • M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient constructions. In Proc. ASIA-CRYPT 2000, LNCS 1976, pp. 317-330. Springer, 2000.
    • (2000) Proc. ASIA-CRYPT 2000 , pp. 317-330
    • Bellare, M.1    Rogaway, P.2
  • 13
    • 2442519269 scopus 로고    scopus 로고
    • A semantics for web service authentication
    • ACM Press
    • K. Bhargavan, C. Fournet, and A. Gordon. A semantics for web service authentication. In Proc. 31st POPL, pp. 198-209. ACM Press, 2004.
    • (2004) Proc. 31st POPL , pp. 198-209
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.3
  • 14
    • 14844303360 scopus 로고    scopus 로고
    • Verifying policy-based security for web services
    • K. Bhargavan, C. Fournet, and A. Gordon. Verifying policy-based security for web services. In Proc. 11th ACM CCS, pp. 268-277, 2004.
    • (2004) Proc. 11th ACM CCS , pp. 268-277
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.3
  • 15
    • 35048821943 scopus 로고    scopus 로고
    • TulaFale: A security tool for web servies
    • LNCS 3188, Springer
    • K. Bhargavan, C. Fournet, A. Gordon, and R. Pucella. TulaFale: A security tool for web servies. In Proc. 2nd FMCO, LNCS 3188, pp. 197-222. Springer, 2004.
    • (2004) Proc. 2nd FMCO , pp. 197-222
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.3    Pucella, R.4
  • 16
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE CSFW, pp. 82-96, 2001.
    • (2001) Proc. 14th IEEE CSFW , pp. 82-96
    • Blanchet, B.1
  • 20
    • 33646073024 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange)
    • R. Canetti and J. Herzog. Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange). Cryptology ePrint Archive, Report 2004/334, 2004.
    • (2004) Cryptology EPrint Archive, Report 2004/334
    • Canetti, R.1    Herzog, J.2
  • 23
    • 35248860689 scopus 로고    scopus 로고
    • Security properties: Two agents are sufficient
    • LNCS 2618, Springer
    • H. Comon-Lundh and V. Cortier. Security properties: two agents are sufficient. In Proc. 12th ESOP, LNCS 2618, pp. 99-113. Springer, 2003.
    • (2003) Proc. 12th ESOP , pp. 99-113
    • Comon-Lundh, H.1    Cortier, V.2
  • 30
    • 23144459426 scopus 로고    scopus 로고
    • Towards an independent semantics and verification technology for the HLPSL specification language
    • A. Gotsman, F. Massacci, and M. Pistore. Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language. Electronic Notes in Theoretical Computer Science 135(1):59-77, 2005.
    • (2005) Electronic Notes in Theoretical Computer Science , vol.135 , Issue.1 , pp. 59-77
    • Gotsman, A.1    Massacci, F.2    Pistore, M.3
  • 35
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and verifying security protocols
    • LNCS 1955, Springer
    • F. Jacquemard, M. Rusinowitch, and L. Vigneron. Compiling and verifying security protocols. In Proc. LPAR 2000, LNCS 1955, pp. 131-160. Springer, 2000.
    • (2000) Proc. LPAR 2000 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 38
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symposium on Security & Privacy, pp. 71-85, 2004.
    • (2004) Proc. 25th IEEE Symposium on Security & Privacy , pp. 71-85
    • Laud, P.1
  • 39
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • G. Lowe. A hierarchy of authentication specifications. In Proc. 10th IEEE CSFW, pp. 31-43, 1997.
    • (1997) Proc. 10th IEEE CSFW , pp. 31-43
    • Lowe, G.1
  • 40
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • LNCS 2951, Springer
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st TCC, LNCS 2951, pp. 133-151. Springer, 2004.
    • (2004) Proc. 1st TCC , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 41
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D. Song, S. Berezin, and A. Perrig. Athena: a novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9:47-74, 2001.
    • (2001) Journal of Computer Security , vol.9 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.