메뉴 건너뛰기




Volumn 367, Issue 1-2, 2006, Pages 88-122

On the semantics of Alice&Bob specifications of security protocols

Author keywords

Alice Bob specifications; Message sequences; Protocol models; Security protocols; Spi calculus

Indexed keywords

CODES (STANDARDS); DATA STRUCTURES; DATA TRANSFER; PATTERN MATCHING; SECURITY OF DATA; SEMANTICS;

EID: 33750486827     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2006.08.041     Document Type: Article
Times cited : (24)

References (42)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: the spi calculus
    • Abadi M., and Gordon A.D. A calculus for cryptographic protocols: the spi calculus. Inform. Comput. 148 (1999) 1-70
    • (1999) Inform. Comput. , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Abadi M., and Rogaway P. Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology 15 2 (2002) 103-127
    • (2002) J. Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 26444497860 scopus 로고    scopus 로고
    • A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Heám, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, L. Vigneron, The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, in: Proc. CAV'05, Lecture Notes in Computer Science, Vol. 3576, Springer, Berlin, 2005, pp. 281-285.
  • 4
    • 84937567009 scopus 로고    scopus 로고
    • A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna, S. Mödersheim, M. Rusinowitch, M. Turuani, L. Viganò, L. Vigneron, The AVISS security protocol analysis tool, in: Proc. CAV'02, Lecture Notes in Computer Science, Vol. 2404, Springer, Berlin, 2002, pp. 349-354.
  • 5
    • 0031650188 scopus 로고    scopus 로고
    • N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, in: Proc. IEEE Symp. on Research in Security and Privacy, IEEE Computer Society Press, Silver Spring, MD, 1998, pp. 86-99.
  • 6
    • 0009956081 scopus 로고    scopus 로고
    • D. Basin, G. Denker, Maude versus Haskell: an experimental comparison in security protocol analysis, in: Proc. WRLA'00, ENTCS, Vol. 36, 2001, pp. 235-256.
  • 8
    • 0034822279 scopus 로고    scopus 로고
    • B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, in: Proc. CSFW'01, IEEE Computer Society Press, Silver Spring, MD, 2001, pp. 82-96.
  • 10
    • 84874713281 scopus 로고    scopus 로고
    • M. Boreale, M.G. Buscemi, A framework for the analysis of security protocols, in: Proc. CONCUR 2002, Lecture Notes in Computer Science, Vol. 2421, Springer, Berlin, 2002, pp. 483-498.
  • 11
    • 85025425124 scopus 로고    scopus 로고
    • S. Brackin, C. Meadows, J. Millen, CAPSL interface for the NRL protocol analyzer, in: Proc. ASSET'99, IEEE Computer Society Press, Silver Spring, MD, 1999.
  • 12
    • 33646198427 scopus 로고    scopus 로고
    • S. Briais, U. Nestmann, A formal semantics for protocol narrations, in: Proc. TGC'05, Lecture Notes in Computer Science, Vol. 3705, Springer, Berlin, 2005, pp. 163-181.
  • 14
    • 23144446730 scopus 로고    scopus 로고
    • C. Caleiro, L. Viganò, D. Basin, Deconstructing Alice and Bob, in: Proc. ARSPA'05, ENTCS, Vol. 135(1), 2005, pp. 3-22.
  • 15
    • 14044252798 scopus 로고    scopus 로고
    • C. Caleiro, L. Viganò, D. Basin, Metareasoning about security protocols using distributed temporal logic, in: Proc. ARSPA'04, ENTCS, Vol. 125(1), 2005, pp. 67-89.
  • 16
    • 33750428466 scopus 로고    scopus 로고
    • Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, J. Mantovani, S. Mödersheim, L. Vigneron, A high level protocol specification language for industrial security-sensitive protocols, in: Proc. SAPS'04, Austrian Computer Society, 2004, pp. 193-205.
  • 18
    • 33750480768 scopus 로고    scopus 로고
    • J. Clark, J. Jacob, A survey of authentication protocol literature: version 1.0, 17. November 1997, URL: 〈www.cs.york.ac.uk/~jac/papers/ www.drareview.ps.gz〉.
  • 19
    • 33750457558 scopus 로고    scopus 로고
    • H. Comon-Lundh, V. Shmatikov, Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, in: Proc. LICS'03, IEEE Computer Society Press, Silver Spring, MD, 2003.
  • 20
    • 84958742278 scopus 로고    scopus 로고
    • R. Corin, S. Etalle, An improved constraint-based system for the verification of security protocols, in: Proc. SAS'02, Lecture Notes in Computer Science, Vol. 2477, Springer, Berlin, 2002.
  • 21
    • 84877781491 scopus 로고    scopus 로고
    • F. Crazzolara, G. Winskel, Composing strand spaces, in: Proc. FST TCS 2002, Lecture Notes in Computer Science, Vol. 2556, Springer, Berlin, 2002, pp. 97-108.
  • 22
    • 33750458570 scopus 로고    scopus 로고
    • C. Cremers, Scyther documentation, 〈http://www.win.tue.nl/~ccremers/scyther〉.
  • 23
    • 0035393979 scopus 로고    scopus 로고
    • LSCs: breathing life into message sequence charts
    • Damm W., and Harel D. LSCs: breathing life into message sequence charts. Formal Methods in System Design 19 1 (2001) 45-80
    • (2001) Formal Methods in System Design , vol.19 , Issue.1 , pp. 45-80
    • Damm, W.1    Harel, D.2
  • 24
    • 33750443127 scopus 로고    scopus 로고
    • G. Denker, J. Millen, H. Rueß, The CAPSL integrated protocol environment, Technical Report SRI-CSL-2000-02, SRI International, Menlo Park, CA, 2000.
  • 25
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev D., and Yao A. On the security of public key protocols. IEEE Trans. Inform. Theory 29 2 (1983) 198-208
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 26
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • Durgin N., Mitchell J.C., and Pavlovic D. A compositional logic for proving security properties of protocols. J. Comput. Security 11 (2003) 677-721
    • (2003) J. Comput. Security , vol.11 , pp. 677-721
    • Durgin, N.1    Mitchell, J.C.2    Pavlovic, D.3
  • 27
    • 0034835462 scopus 로고    scopus 로고
    • A.D. Gordon, A. Jeffrey, Authenticity by typing for security protocols, in: Proc. CSFW'01, IEEE Computer Society Press, Silver Spring, MD, 2001, pp. 145-159.
  • 28
    • 33750454331 scopus 로고    scopus 로고
    • C. Haack, A. Jeffrey, Pattern-matching spi-calculus, in: Proc. FAST'04, IFIP series 173, Kluwer Academic Press, Dordrecht, 2004, pp. 193-205.
  • 29
    • 3142594319 scopus 로고    scopus 로고
    • On the relationship between strand spaces and multi-agent systems
    • Halpern J.Y., and Pucella R. On the relationship between strand spaces and multi-agent systems. ACM Trans. Inform. System Security 6 1 (2003) 43-70
    • (2003) ACM Trans. Inform. System Security , vol.6 , Issue.1 , pp. 43-70
    • Halpern, J.Y.1    Pucella, R.2
  • 30
    • 33750471477 scopus 로고    scopus 로고
    • ITU-T Recommendation Z.120: Message Sequence Chart (MSC), 2000.
  • 31
    • 84956860311 scopus 로고    scopus 로고
    • F. Jacquemard, M. Rusinowitch, L. Vigneron, Compiling and verifying security protocols, in: Proc. LPAR 2000, Lecture Notes in Computer Science, Vol. 1955, Springer, Berlin, 2000, pp. 131-160.
  • 32
    • 0031633395 scopus 로고    scopus 로고
    • Casper: a compiler for the analysis of security protocols
    • Lowe G. Casper: a compiler for the analysis of security protocols. J. Comput. Security 6 1 (1998) 53-84
    • (1998) J. Comput. Security , vol.6 , Issue.1 , pp. 53-84
    • Lowe, G.1
  • 33
    • 33750429494 scopus 로고    scopus 로고
    • S. Mauw, M. Reniers, T. Willemse, Message sequence charts in the software engineering process, in: Handbook of Software Engineering and Knowledge Engineering, World Scientific Publishing Co., Singapore, 2001, pp. 437-463.
  • 34
    • 0037250964 scopus 로고    scopus 로고
    • Formal methods for cryptographic protocol analysis: emerging issues and trends
    • Meadows C. Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Comm. 21 1 (2003) 44-54
    • (2003) IEEE J. Sel. Areas Comm. , vol.21 , Issue.1 , pp. 44-54
    • Meadows, C.1
  • 35
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L. The inductive approach to verifying cryptographic protocols. J. Comput. Security 6 (1998) 85-128
    • (1998) J. Comput. Security , vol.6 , pp. 85-128
    • Paulson, L.1
  • 36
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R.L., Shamir A., and Adleman L.M. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21 2 (1978) 120-126
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 39
    • 0035072287 scopus 로고    scopus 로고
    • Athena: a novel approach to efficient automatic security protocol analysis
    • Song D., Berezin S., and Perrig A. Athena: a novel approach to efficient automatic security protocol analysis. J. Comput. Security 9 (2001) 47-74
    • (2001) J. Comput. Security , vol.9 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3
  • 41
    • 33646227667 scopus 로고    scopus 로고
    • L. Viganò, Automated security protocol analysis with the AVISPA tool, in: Proc. MFPS'05, ENTCS, Vol. 155, 2006, pp. 61-86.
  • 42
    • 33750453978 scopus 로고    scopus 로고
    • Wikipedia: Alice and Bob, URL: 〈www.wikipedia.org/wiki/Alice_and_Bob〉.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.