메뉴 건너뛰기




Volumn 3963 LNAI, Issue , 2006, Pages 106-124

Security protocols verification in abductive logic programming: A case study

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; ELECTRONIC COMMERCE; LOGIC PROGRAMMING; MULTI AGENT SYSTEMS; SECURITY OF DATA; TECHNICAL PRESENTATIONS;

EID: 33746592815     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11759683_7     Document Type: Conference Paper
Times cited : (21)

References (30)
  • 1
    • 84943174096 scopus 로고    scopus 로고
    • Categories of artificial societies
    • Omicini, A., Petta, P., Tolksdorf, R., eds.: Engineering Societies in the Agents World II Springer-Verlag (2001) 1-9 2nd International Workshop (ESAW'01), Prague, Czech Republic, July 7, Revised Papers
    • Davidsson, P.: Categories of artificial societies. In Omicini, A., Petta, P., Tolksdorf, R., eds.: Engineering Societies in the Agents World II. Volume 2203 of Lecture Notes in Artificial Intelligence, Springer-Verlag (2001) 1-9 2nd International Workshop (ESAW'01), Prague, Czech Republic, July 7, 2001, Revised Papers
    • (2001) Lecture Notes in Artificial Intelligence , vol.2203
    • Davidsson, P.1
  • 3
    • 84941160092 scopus 로고    scopus 로고
    • A computational logic model for the description, analysis and verification of global and open societies of heterogeneous computees
    • IST-2001-32530
    • Societies Of ComputeeS (SOCS): a computational logic model for the description, analysis and verification of global and open societies of heterogeneous computees, IST-2001-32530 (2001) Home Page: http://lia.deis.unibo.it/Research/SOCS/
    • (2001) Home Page
  • 4
    • 8344240373 scopus 로고    scopus 로고
    • A social ACL semantics by deontic constraints
    • Mařík, V., Müller, J., Pěchouček, M., eds.: Multi-Agent Systems and Applications III. Proceedings of the 3rd International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2003. Prague, Czech Republic, Springer-Verlag
    • Alberti, M., Ciampolini, A., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: A social ACL semantics by deontic constraints. In Mařík, V., Müller, J., Pěchouček, M., eds.: Multi-Agent Systems and Applications III. Proceedings of the 3rd International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2003. Volume 2691 of Lecture Notes in Artificial Intelligence, Prague, Czech Republic, Springer-Verlag (2003) 204-213
    • (2003) Lecture Notes in Artificial Intelligence , vol.2691 , pp. 204-213
    • Alberti, M.1    Ciampolini, A.2    Gavanelli, M.3    Lamma, E.4    Mello, P.5    Torroni, P.6
  • 6
    • 51149120869 scopus 로고    scopus 로고
    • The socs protocol repository (2005) Available at http://lia.deis.unibo.it/research/socs/partners/societies/protocols.html
    • (2005) The Socs Protocol Repository
  • 7
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM 21 (1978) 993-999
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 8
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Shroeder public-key protocol using CSP and FDR
    • Margaria, T., Steffen, B., eds.: Tools and Algorithms for the Construction and Analysis of Systems: Second International Workshop, TACAS'96. Springer-Verlag
    • Lowe, G.: Breaking and fixing the Needham-Shroeder public-key protocol using CSP and FDR. In Margaria, T., Steffen, B., eds.: Tools and Algorithms for the Construction and Analysis of Systems: Second International Workshop, TACAS'96. Volume 1055 of Lecture Notes in Artificial Intelligence, Springer-Verlag (1996) 147-166
    • (1996) Lecture Notes in Artificial Intelligence , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 10
    • 7444226211 scopus 로고    scopus 로고
    • An Abductive Interpretation for Open Societies
    • Cappelli, A., Turini, F., eds.: AI*IA 2003: Advances in Artificial Intelligence, Proceedings of the 8th Congress of the Italian Association for Artificial Intelligence, Pisa. Springer-Verlag
    • Alberti, M., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: An Abductive Interpretation for Open Societies. In Cappelli, A., Turini, F., eds.: AI*IA 2003: Advances in Artificial Intelligence, Proceedings of the 8th Congress of the Italian Association for Artificial Intelligence, Pisa. Volume 2829 of Lecture Notes in Artificial Intelligence, Springer-Verlag (2003) 287-299
    • (2003) Lecture Notes in Artificial Intelligence , vol.2829 , pp. 287-299
    • Alberti, M.1    Gavanelli, M.2    Lamma, E.3    Mello, P.4    Torroni, P.5
  • 11
    • 4243532938 scopus 로고
    • Constraint logic programming: A survey
    • Jaffar, J., Maher, M.: Constraint logic programming: a survey. Journal of Logic Programming 19-20 (1994) 503-582
    • (1994) Journal of Logic Programming , vol.19-20 , pp. 503-582
    • Jaffar, J.1    Maher, M.2
  • 14
    • 33646154223 scopus 로고    scopus 로고
    • The sciff abductive proof-procedure
    • Proceedings of the 9th National Congress on Artificial Intelligence, AI*IA 2005. Springer-Verlag
    • Alberti, M., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: The sciff abductive proof-procedure. In: Proceedings of the 9th National Congress on Artificial Intelligence, AI*IA 2005. Volume 3673 of Lecture Notes in Artificial Intelligence, Springer-Verlag (2005) 135-147
    • (2005) Lecture Notes in Artificial Intelligence , vol.3673 , pp. 135-147
    • Alberti, M.1    Gavanelli, M.2    Lamma, E.3    Mello, P.4    Torroni, P.5
  • 15
    • 0031281313 scopus 로고    scopus 로고
    • The IFF proof procedure for abductive logic programming
    • Fung, T.H., Kowalski, R.A.: The IFF proof procedure for abductive logic programming. Journal of Logic Programming 33 (1997) 151-165
    • (1997) Journal of Logic Programming , vol.33 , pp. 151-165
    • Fung, T.H.1    Kowalski, R.A.2
  • 16
    • 33746649636 scopus 로고    scopus 로고
    • On the automatic verification of interaction protocols using g-SCIFF
    • University of Bologna (Italy) LIA Series no. 72
    • Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: On the automatic verification of interaction protocols using g-SCIFF. Technical Report DEIS-LIA-04-004, University of Bologna (Italy) (2005) LIA Series no. 72.
    • (2005) Technical Report , vol.DEIS-LIA-04-004
    • Alberti, M.1    Chesani, F.2    Gavanelli, M.3    Lamma, E.4    Mello, P.5    Torroni, P.6
  • 18
    • 84888249003 scopus 로고    scopus 로고
    • An abductive approach for analysing event-based requirements specifications
    • Stuckey, P., ed.: Logic Programming, 18th International Conference, ICLP 2002. Berlin Heidelberg, Springer-Verlag
    • Russo, A., Miller, R., Nuseibeh, B., Kramer, J.: An abductive approach for analysing event-based requirements specifications. In Stuckey, P., ed.: Logic Programming, 18th International Conference, ICLP 2002. Volume 2401 of Lecture Notes in Computer Science, Berlin Heidelberg, Springer-Verlag (2002) 22-37
    • (2002) Lecture Notes in Computer Science , vol.2401 , pp. 22-37
    • Russo, A.1    Miller, R.2    Nuseibeh, B.3    Kramer, J.4
  • 19
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • Snekkenes, E., Gollmann, D., eds.: ESORICS. Springer
    • Basin, D.A., Mödersheim, S., Viganò, L.: An on-the-fly model-checker for security protocol analysis. In Snekkenes, E., Gollmann, D., eds.: ESORICS. Volume 2808 of Lecture Notes in Computer Science, Springer (2003) 253-270
    • (2003) Lecture Notes in Computer Science , vol.2808 , pp. 253-270
    • Basin, D.A.1    Mödersheim, S.2    Viganò, L.3
  • 21
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. J. ACM 52 (2005) 102-146
    • (2005) J. ACM , vol.52 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 23
    • 22944484456 scopus 로고    scopus 로고
    • Automatic compilation of protocol insecurity problems into logic programming
    • Alferes, J.J., Leite, J.A., eds.: Logics in Artificial Intelligence, 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004, Proceedings. Springer-Verlag
    • Armando, A., Compagna, L., Lierler, Y.: Automatic compilation of protocol insecurity problems into logic programming. In Alferes, J.J., Leite, J.A., eds.: Logics in Artificial Intelligence, 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004, Proceedings. Volume 3229 of Lecture Notes in Artificial Intelligence, Springer-Verlag (2004) 617-627
    • (2004) Lecture Notes in Artificial Intelligence , vol.3229 , pp. 617-627
    • Armando, A.1    Compagna, L.2    Lierler, Y.3
  • 24
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6 (1998) 85-128
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 26
    • 84958742278 scopus 로고    scopus 로고
    • An improved constraint-based system for the verification of security protocols
    • Hermenegildo, M.V., Puebla, G., eds.: Static Analysis, 9th International Symposium, SAS 2002, Madrid, Spain, September 17-20, 2002, Proceedings. Berlin, Germany, Springer
    • Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In Hermenegildo, M.V., Puebla, G., eds.: Static Analysis, 9th International Symposium, SAS 2002, Madrid, Spain, September 17-20, 2002, Proceedings. Volume 2477 of Lecture Notes in Computer Science, Berlin, Germany, Springer (2002) 326-341
    • (2002) Lecture Notes in Computer Science , vol.2477 , pp. 326-341
    • Corin, R.1    Etalle, S.2
  • 27
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • Washington, DC, USA, IEEE Computer Society
    • Song, D.X.: Athena: a new efficient automatic checker for security protocol analysis. In: CSFW '99: Proceedings of the 1999 IEEE Computer Security Foundations Workshop, Washington, DC, USA, IEEE Computer Society (1999) 192
    • (1999) CSFW '99: Proceedings of the 1999 IEEE Computer Security Foundations Workshop , pp. 192
    • Song, D.X.1
  • 30
    • 6744240283 scopus 로고
    • The design and implementation of an authentication system for the wide area distributed environment
    • Yamaguchi, S., Okayama, K., Miyahara, H.: The design and implementation of an authentication system for the wide area distributed environment. IEICE Transactions on Information and Systems E74 (1991) 3902-3909
    • (1991) IEICE Transactions on Information and Systems , vol.E74 , pp. 3902-3909
    • Yamaguchi, S.1    Okayama, K.2    Miyahara, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.