메뉴 건너뛰기




Volumn 172, Issue , 2007, Pages 311-358

Protocol Composition Logic (PCL)

Author keywords

composition; logic; Security protocol analysis

Indexed keywords

SECURITY PROTOCOL ANALYSIS; SYMMETRIC KEY CRYPTOGRAPHY;

EID: 33847655213     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2007.02.012     Document Type: Article
Times cited : (170)

References (77)
  • 1
    • 0035035153 scopus 로고    scopus 로고
    • Abadi, M. and C. Fournet, Mobile values, new names, and secure communication, in: 28th ACM Symposium on Principles of Programming Languages, 2001, pp. 104-115
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: the spi calculus
    • expanded version available as SRC Research Report 149 (January 1998)
    • Abadi M., and Gordon A. A calculus for cryptographic protocols: the spi calculus. Information and Computation 148 (1999) 1-70 expanded version available as SRC Research Report 149 (January 1998)
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 5
    • 28144440505 scopus 로고    scopus 로고
    • Backes, M., A. Datta, A. Derek, J.C. Mitchell and M. Turuani, Compositional analysis of contract signing protocols, in: Proceedings of 18th IEEE Computer Security Foundations Workshop (2005)
  • 6
    • 33847642541 scopus 로고    scopus 로고
    • Beauxis, R. and C. Palamidessi, On the asynchronous nature of the asynchronous π-calculus (2006), manuscript
  • 7
    • 22444455879 scopus 로고    scopus 로고
    • Bella, G. and L.C. Paulson, Kerberos version IV: Inductive analysis of the secrecy goals, in: J.-J. Quisquater, editor, Proceedings of the 5th European Symposium on Research in Computer Security (1998), pp. 361-375
  • 8
    • 84945119254 scopus 로고    scopus 로고
    • Bellare, M. and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryprtology - Crypto '93 Proceedings, pp. 232-249
  • 10
    • 0034822279 scopus 로고    scopus 로고
    • Blanchet, B., An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, in: 14th IEEE Computer Security Foundations Workshop (CSFW-14) (2001), pp. 82-96
  • 11
    • 85177219949 scopus 로고    scopus 로고
    • Borisov, N., I. Goldberg and D. Wagner, Intercepting mobile communications: the insecurity of 802.11, in: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, 2001, pp. 180-189.
  • 14
    • 33847657941 scopus 로고    scopus 로고
    • Butler, F., I. Cervesato, A. Jaggard, A. Scedrov and C. Walstad, Formal analysis of Kerberos 5 (2006), Theoretical Computer Science, in press
  • 15
    • 35048902360 scopus 로고    scopus 로고
    • Verifying confidentiality and authentication in kerberos 5
    • Software Security - Theories and Systems. Second Mext-NSF-JSPS International Symposium, ISSS 2003
    • Butler F., Cervesato I., Jaggard A.D., and Scedrov A. Verifying confidentiality and authentication in kerberos 5. Software Security - Theories and Systems. Second Mext-NSF-JSPS International Symposium, ISSS 2003. Lecture Notes in Computer Science 3233 (2003) 1-24
    • (2003) Lecture Notes in Computer Science , vol.3233 , pp. 1-24
    • Butler, F.1    Cervesato, I.2    Jaggard, A.D.3    Scedrov, A.4
  • 17
    • 2642523732 scopus 로고    scopus 로고
    • Environmental requirements for authentication protocols
    • Proceedings of Software Security - Theories and Systems. Mext-NSF-JSPS International Symposium, ISSS
    • Canetti R., Meadows C., and Syverson P. Environmental requirements for authentication protocols. Proceedings of Software Security - Theories and Systems. Mext-NSF-JSPS International Symposium, ISSS. LNCS vol. 2609 (2003) 339-355
    • (2003) LNCS , vol.2609 , pp. 339-355
    • Canetti, R.1    Meadows, C.2    Syverson, P.3
  • 18
    • 33847685835 scopus 로고    scopus 로고
    • Cervesato, I., A. Jaggard, A. Scedrov, J.-K. Tsay and C. Walstad, Breaking and fixing public-key kerberos, Technical report. URL ftp://ftp.cis.upenn.edu/pub/papers/scedrov/pkinit.pdf
  • 19
    • 33847610010 scopus 로고    scopus 로고
    • Cervesato, I., A. Jaggard, A. Scedrov, J.-K. Tsay and C. Walstad, Breaking and fixing public-key Kerberos, in: Proc. 11-th Asian Computing Science Conference (ASIAN'06), Springer LNCS, to appear, 2006, preliminary report on http://eprint.iacr.org/2006/009
  • 20
    • 34548864135 scopus 로고    scopus 로고
    • Datta, A., A. Derek, J.C. Mitchell and D. Pavlovic, A derivation system for security protocols and its logical formalization, in: Proceedings of 16th IEEE Computer Security Foundations Workshop (2003), pp. 109-125
  • 21
    • 2642548302 scopus 로고    scopus 로고
    • Datta, A., A. Derek, J.C. Mitchell and D. Pavlovic, Secure protocol composition (extended abstract), in: Proceedings of ACM Workshop on Formal Methods in Security Engineering, 2003, pp. 11-23
  • 22
    • 4944226639 scopus 로고    scopus 로고
    • Datta, A., A. Derek, J.C. Mitchell and D. Pavlovic, Abstraction and refinement in protocol derivation, in: Proceedings of 17th IEEE Computer Security Foundations Workshop (2004), pp. 30-45
  • 23
    • 33847664642 scopus 로고    scopus 로고
    • Datta, A., A. Derek, J.C. Mitchell and D. Pavlovic, Secure protocol composition, in: Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics (2004)
  • 25
    • 26444565771 scopus 로고    scopus 로고
    • Probabilistic polynomial-time semantics for a protocol security logic
    • Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP '05)
    • Datta A., Derek A., Mitchell J.C., Shmatikov V., and Turuani M. Probabilistic polynomial-time semantics for a protocol security logic. Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP '05). Lecture Notes in Computer Science (2005) 16-29
    • (2005) Lecture Notes in Computer Science , pp. 16-29
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Shmatikov, V.4    Turuani, M.5
  • 26
    • 33947704230 scopus 로고    scopus 로고
    • Datta, A., A. Derek, J.C. Mitchell and B. Warinschi, Computationally sound compositional logic for key exchange protocols, in: Proceedings of 19th IEEE Computer Security Foundations Workshop (2006), pp. 321-334
  • 29
    • 0034834930 scopus 로고    scopus 로고
    • Durgin, N., J.C. Mitchell and D. Pavlovic, A compositional logic for protocol correctness, in: Proceedings of 14th IEEE Computer Security Foundations Workshop (2001), pp. 241-255
  • 30
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • Durgin N., Mitchell J.C., and Pavlovic D. A compositional logic for proving security properties of protocols. Journal of Computer Security 11 (2003) 677-721
    • (2003) Journal of Computer Security , vol.11 , pp. 677-721
    • Durgin, N.1    Mitchell, J.C.2    Pavlovic, D.3
  • 34
    • 0033714403 scopus 로고    scopus 로고
    • Guttman, J.D. and F.J.T. Fábrega, Protocol independence through disjoint encryption, in: Proceedings of 13th IEEE Computer Security Foundations Workshop (2000), pp. 24-34
  • 36
    • 33847651277 scopus 로고    scopus 로고
    • Harkins, D. and D. Carrel, The Internet Key Exchange (IKE) (1998), rFC 2409
  • 38
    • 33745770376 scopus 로고    scopus 로고
    • He, C., M. Sundararajan, A. Datta, A. Derek and J.C. Mitchell, A modular correctness proof of IEEE 802.11i and TLS, in: CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, 2005, pp. 2-15
  • 40
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • Hoare C.A.R. An axiomatic basis for computer programming. Communications of the ACM 12 (1969) 576-580
    • (1969) Communications of the ACM , vol.12 , pp. 576-580
    • Hoare, C.A.R.1
  • 41
    • 0018005391 scopus 로고
    • Communicating sequential processes
    • Hoare C.A.R. Communicating sequential processes. Commun. ACM 21 (1978) 666-677
    • (1978) Commun. ACM , vol.21 , pp. 666-677
    • Hoare, C.A.R.1
  • 42
    • 33847678955 scopus 로고    scopus 로고
    • Kelsey, J., B. Schneier and D. Wagner, Protocol interactions and the chosen protocol attack, in: Proceedings of the International Workshop on Security Protocols, 1997
  • 43
    • 33847660020 scopus 로고    scopus 로고
    • Kohl, J. and B. Neuman, The Kerberos network authentication service (version 5), IETF RFC 1510 (1993)
  • 44
    • 84958052989 scopus 로고    scopus 로고
    • Probabilistic polynomial-time equivalence and security protocols
    • Formal Methods World Congress, vol. I
    • Lincoln P.D., Mitchell J.C., Mitchell M., and Scedrov A. Probabilistic polynomial-time equivalence and security protocols. Formal Methods World Congress, vol. I. Lecture Notes in Computer Science 1708 (1999) 776-793
    • (1999) Lecture Notes in Computer Science , vol.1708 , pp. 776-793
    • Lincoln, P.D.1    Mitchell, J.C.2    Mitchell, M.3    Scedrov, A.4
  • 45
    • 0029719080 scopus 로고    scopus 로고
    • Lowe, G., Some new attacks upon security protocols, in: Proceedings of 9th IEEE Computer Security Foundations Workshop (1996), pp. 162-169
  • 46
    • 0032684740 scopus 로고    scopus 로고
    • Lynch, N., I/O automata models and proofs for shared-key communication systems, in: Proceedings of 12th IEEE Computer Security Foundations Workshop (1999), pp. 14-29
  • 48
    • 84948418498 scopus 로고    scopus 로고
    • Mantel, H., On the Composition of Secure Systems, in: Proceedings of the IEEE Symposium on Security and Privacy (2002), pp. 88-101
  • 49
    • 0023829319 scopus 로고    scopus 로고
    • McCullough, D., Noninterference and the composability of security properties, in: Proceedings of the IEEE Symposium on Security and Privacy (1988), pp. 177-186
  • 51
    • 0025139568 scopus 로고    scopus 로고
    • McLean, J., Security models and information flow, in: Proceedings of the IEEE Symposium on Security and Privacy (1990)
  • 52
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of "possibilistic" properties
    • McLean J. A general theory of composition for a class of "possibilistic" properties. IEEE Transactions on Software Engineering 22 (1996) 53-67
    • (1996) IEEE Transactions on Software Engineering , vol.22 , pp. 53-67
    • McLean, J.1
  • 53
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows C. The NRL protocol analyzer: An overview. Journal of Logic Programming 26 (1996) 113-131
    • (1996) Journal of Logic Programming , vol.26 , pp. 113-131
    • Meadows, C.1
  • 54
    • 33847690659 scopus 로고    scopus 로고
    • Meadows, C., Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer, in: Proceedings of the IEEE Symposium on Security and Privacy (1998)
  • 55
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • Meadows C. Open issues in formal methods for cryptographic protocol analysis. Proceedings of DISCEX 2000 (2000) 237-250
    • (2000) Proceedings of DISCEX 2000 , pp. 237-250
    • Meadows, C.1
  • 56
    • 33745772467 scopus 로고    scopus 로고
    • Deriving, attacking and defending the GDOI protocol
    • Computer Security - ESORICS 2004, Proceedings. 9th European Symposium on Research Computer Security
    • Meadows C., and Pavlovic D. Deriving, attacking and defending the GDOI protocol. Computer Security - ESORICS 2004, Proceedings. 9th European Symposium on Research Computer Security. Lecture Notes in Computer Science 3193 (2004) 53-72
    • (2004) Lecture Notes in Computer Science , vol.3193 , pp. 53-72
    • Meadows, C.1    Pavlovic, D.2
  • 59
    • 0030705405 scopus 로고    scopus 로고
    • Mitchell, J., M. Mitchell and U. Stern, Automated analysis of cryptographic protocols using Murφ{symbol}, in: Proc. IEEE Symp. Security and Privacy, 1997, pp. 141-151
  • 60
    • 85084160482 scopus 로고    scopus 로고
    • Mitchell, J.C., V. Shmatikov and U. Stern, Finite-state analysis of ssl 3.0, in: Proceedings of the Seventh USENIX Security Symposium, 1998, pp. 201-216
  • 61
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM 21 (1978) 993-999
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 63
    • 0030696539 scopus 로고    scopus 로고
    • Paulson, L., Mechanized proofs for a recursive authentication protocol, in: Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997, pp. 84-95
  • 64
    • 0030705795 scopus 로고    scopus 로고
    • Paulson, L., Proving properties of security protocols by induction, in: Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997, pp. 70-83
  • 65
    • 35048876713 scopus 로고    scopus 로고
    • Probabilistic bisimulation and equivalence for security analysis of network protocols
    • Foundations of Software Science and Computation Structures, Proceedings. 7th International Conference, FOSSACS 2004
    • Ramanathan A., Mitchell J.C., Scedrov A., and Teague V. Probabilistic bisimulation and equivalence for security analysis of network protocols. Foundations of Software Science and Computation Structures, Proceedings. 7th International Conference, FOSSACS 2004. Lecture Notes in Computer Science 2987 (2004) 468-483
    • (2004) Lecture Notes in Computer Science , vol.2987 , pp. 468-483
    • Ramanathan, A.1    Mitchell, J.C.2    Scedrov, A.3    Teague, V.4
  • 66
    • 0029484376 scopus 로고    scopus 로고
    • Roscoe, A.W., Modelling and verifying key-exchange protocols using CSP and FDR, in: 8th IEEE Computer Security Foundations Workshop (1995), pp. 98-107
  • 67
    • 33847633426 scopus 로고    scopus 로고
    • Roy, A., A. Datta, A. Derek and J.C. Mitchell, Inductive proof method for computational secrecy (2006), manuscript
  • 68
    • 33847624548 scopus 로고    scopus 로고
    • Roy, A., A. Datta, A. Derek, J.C. Mitchell and J.-P. Seifert, Secrecy analysis in protocol composition logic. (2006), to appear in Proceedings of 11th Annual Asian Computing Science Conference, December 2006
  • 70
    • 0029721645 scopus 로고    scopus 로고
    • Schneider, S., Security properties and CSP, in: IEEE Symp. Security and Privacy, 1996
  • 72
    • 0032678887 scopus 로고    scopus 로고
    • Song, D., Athena: a new efficient automatic checker for security protocol analysis, in: Proceedings of 12th IEEE Computer Security Foundations Workshop (1999), pp. 192-202
  • 73
    • 0027929693 scopus 로고    scopus 로고
    • Syverson, P. and P. van Oorschot, On unifying some cryptographic protocol logics, in: Proceedings of 7th IEEE Computer Security Foundations Workshop, 1994, pp. 14-29
  • 74
    • 0032671776 scopus 로고    scopus 로고
    • Thayer, F.J., J.C. Herzog and J.D. Guttman, Mixed strand spaces, in: Proceedings of 12th IEEE Computer Security Foundations Workshop (1999), pp. 72-82
  • 75
  • 76
    • 84946432389 scopus 로고    scopus 로고
    • Wagner, D. and B. Schneier, Analysis of the ssl 3.0 protocol, in: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, 1996
  • 77
    • 0027205880 scopus 로고    scopus 로고
    • Woo, T.Y.C. and S.C. Lam, A semantic model for authentication protocols, in: Proceedings IEEE Symposium on Research in Security and Privacy, 1993


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.