메뉴 건너뛰기




Volumn 19, Issue 1, 2007, Pages 63-91

Verifying a signature architecture: A comparative case study

Author keywords

Case study; Comparison; Formal methods; Model checking; Security; Theorem proving

Indexed keywords

AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MATHEMATICAL MODELS; MODEL CHECKING; SECURITY OF DATA; THEOREM PROVING;

EID: 33947138592     PISSN: 09345043     EISSN: 1433299X     Source Type: Journal    
DOI: 10.1007/s00165-006-0012-5     Document Type: Article
Times cited : (5)

References (51)
  • 1
    • 0029390712 scopus 로고
    • Formalizing style to understand descriptions of software architecture
    • Abowd GD, Allen R, Garlan D (1995) Formalizing style to understand descriptions of software architecture. ACM Trans Softw Eng Methodol (TOSEM) 4(4):319-364
    • (1995) ACM Trans Softw Eng Methodol (TOSEM) , vol.4 , Issue.4 , pp. 319-364
    • Abowd, G.D.1    Allen, R.2    Garlan, D.3
  • 2
    • 0003554160 scopus 로고
    • Formal methods for industrial applications: Specifying and programming the steam boiler control
    • of, Springer, Berlin Heidelberg New York
    • Abrial J-R, Börger E, Langmaack H (1986) Formal methods for industrial applications: Specifying and programming the steam boiler control, volume 1165 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York
    • (1986) Lecture Notes in Computer Science , vol.1165
    • Abrial, J.-R.1    Börger, E.2    Langmaack, H.3
  • 4
    • 0003595275 scopus 로고    scopus 로고
    • Comparing finite-state verification techniques for concurrent software
    • Technical report, Amherst, MA, USA
    • Avrunin GS, Corbett JC, Dwyer MB, Pasareanu CS, Siegel SF (1999) Comparing finite-state verification techniques for concurrent software. Technical report, Amherst, MA, USA
    • (1999)
    • Avrunin, G.S.1    Corbett, J.C.2    Dwyer, M.B.3    Pasareanu, C.S.4    Siegel, S.F.5
  • 5
    • 0028202370 scopus 로고
    • A really temporal logic
    • Alur R, Henzinger TA (1994) A really temporal logic. J ACM 41(1):181-203
    • (1994) J ACM , vol.41 , Issue.1 , pp. 181-203
    • Alur, R.1    Henzinger, T.A.2
  • 8
    • 33947124786 scopus 로고    scopus 로고
    • Basin D, Friedrich S (2000) Combining WS1S and HOL. In Gabbay DM de Rijke M (eds) Frontiers of Combining Systems 2, 7 of Studies in Logic and Computation. Res Stud Press/Wiley, Baldock, Herts, UK, 39-56
    • Basin D, Friedrich S (2000) Combining WS1S and HOL. In Gabbay DM de Rijke M (eds) Frontiers of Combining Systems 2, vol 7 of Studies in Logic and Computation. Res Stud Press/Wiley, Baldock, Herts, UK, 39-56
  • 9
    • 0029346301 scopus 로고
    • Seven more myths of formal methods
    • Bowen JP, Hinchey MG, (1995) Seven more myths of formal methods. IEEE Softw, 12(3):34-41
    • (1995) IEEE Softw , vol.12 , Issue.3 , pp. 34-41
    • Bowen, J.P.1    Hinchey, M.G.2
  • 10
    • 26444517471 scopus 로고
    • The Boyer-Moore Prover and Nuprl: An experimental comparison
    • Huet G, Plotkin G, eds, Cambridge University Press, Cambridge, pp
    • Basin D, Kaufmann M, (1990) The Boyer-Moore Prover and Nuprl: an experimental comparison. In: Huet G, Plotkin G, (eds) Logical Frameworks. Cambridge University Press, Cambridge, pp. 90-119
    • (1990) Logical Frameworks , pp. 90-119
    • Basin, D.1    Kaufmann, M.2
  • 11
    • 26444601502 scopus 로고    scopus 로고
    • Specifying and verifying hysteresis signature system with HOL-Z
    • Technical Report 471, ETH Zürich. Available at the URL
    • Basin D, Kuruma H, Takaragi K, Wolff B (2004) Specifying and verifying hysteresis signature system with HOL-Z. Technical Report 471, ETH Zürich. Available at the URL http://kisogawa.inf.ethz.ch/WebBIB/publications/papers/ 2005/HSD.pdf.
    • (2004)
    • Basin, D.1    Kuruma, H.2    Takaragi, K.3    Wolff, B.4
  • 12
    • 0002457511 scopus 로고
    • Integrating decision procedures into heuristic theorem provers: A case study with linear arithmetic
    • Boyer RS, Moore JS (1988) Integrating decision procedures into heuristic theorem provers: a case study with linear arithmetic. Mach Intell(11):83-124
    • (1988) Mach Intell , vol.11 , pp. 83-124
    • Boyer, R.S.1    Moore, J.S.2
  • 13
  • 15
    • 16244410402 scopus 로고    scopus 로고
    • HOL-Z 2.0: A proof environment for Z-specifications
    • Brucker AD, Rittinger F, Wolff B (2003) HOL-Z 2.0: A proof environment for Z-specifications. J Univ Comput Sci 9(2):152-172
    • (2003) J Univ Comput Sci , vol.9 , Issue.2 , pp. 152-172
    • Brucker, A.D.1    Rittinger, F.2    Wolff, B.3
  • 19
    • 0000706110 scopus 로고    scopus 로고
    • Evaluating deadlock detection methods for concurrent software
    • Corbett JC (1996) Evaluating deadlock detection methods for concurrent software. IEEE Trans Softw Eng 22(3):161-180
    • (1996) IEEE Trans Softw Eng , vol.22 , Issue.3 , pp. 161-180
    • Corbett, J.C.1
  • 20
    • 26944496823 scopus 로고    scopus 로고
    • Proof planning for first-order temporal logic
    • Conference on automated deduction, of, Springer, Berlin Heidelberg New York
    • Castellini C, Smaill A (2005) Proof planning for first-order temporal logic. In: Conference on automated deduction, vol 3632 of Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York 235-249
    • (2005) Lecture Notes in Computer Science , vol.3632 , pp. 235-249
    • Castellini, C.1    Smaill, A.2
  • 24
    • 84958741847 scopus 로고    scopus 로고
    • Fast LTL to Büchi automata translation
    • Berry G, Comon H, Finkel A (eds) Proceedings of the 13th conference on computer aided verification CAV'01, number, Springer, Berlin Heidelberg New York pp
    • Gastin P, Oddoux D (2001) Fast LTL to Büchi automata translation. In: Berry G, Comon H, Finkel A (eds) Proceedings of the 13th conference on computer aided verification (CAV'01), number 2102 in Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York pp. 53-65.
    • (2001) Lecture Notes in Computer Science , vol.2102 , pp. 53-65
    • Gastin, P.1    Oddoux, D.2
  • 25
    • 0001550560 scopus 로고
    • Formal hardware verification methods: A survey
    • Gupta A (1992) Formal hardware verification methods: A survey. J Formal Methods Syst Des 1:151-238
    • (1992) J Formal Methods Syst Des , vol.1 , pp. 151-238
    • Gupta, A.1
  • 26
    • 0025489197 scopus 로고
    • Seven myths of formal methods
    • Hall A (1990) Seven myths of formal methods. IEEE Softw 7(5):11-19
    • (1990) IEEE Softw , vol.7 , Issue.5 , pp. 11-19
    • Hall, A.1
  • 28
    • 33947129401 scopus 로고    scopus 로고
    • International Standard ISO/IEC13568:2002. Information technology - Z formal specification notation - syntax, type system and semantics.
    • International Standard ISO/IEC13568:2002. Information technology - Z formal specification notation - syntax, type system and semantics.
  • 30
    • 0031634547 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • IEEE Computer Society Press pp
    • Lowe G (1998) Towards a completeness result for model checking of security protocols. In: PCSFW: Proceedings of the 11th computer security foundations workshop, IEEE Computer Society Press pp. 96-105
    • (1998) PCSFW: Proceedings of the 11th computer security foundations workshop , pp. 96-105
    • Lowe, G.1
  • 31
    • 84957810836 scopus 로고    scopus 로고
    • Müller O, Nipkow T (1995) Combining model checking and deduction for I/O-automata. In Brinksma et al Ed (eds) Tools and algorithms for the construction and analysis of systems, 1st international workshop, TACAS'95, 1019 of Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York, pp 1-16
    • Müller O, Nipkow T (1995) Combining model checking and deduction for I/O-automata. In Brinksma et al Ed (eds) Tools and algorithms for the construction and analysis of systems, 1st international workshop, TACAS'95, vol 1019 of Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York, pp 1-16
  • 32
    • 0026172359 scopus 로고
    • Completing the temporal picture
    • Manna Z, Pnueli A (1991) Completing the temporal picture. Theore Comput Sci J 83(1):97-130
    • (1991) Theore Comput Sci , vol.J 83 , Issue.1 , pp. 97-130
    • Manna, Z.1    Pnueli, A.2
  • 34
    • 33745472695 scopus 로고    scopus 로고
    • Norrish M (2003) Complete integer decision procedures as derived rules in HOL. In: Proceedings of TPHOLs'03, number 2758 in Lecture Notes in Computer Science, 71-86.
    • Norrish M (2003) Complete integer decision procedures as derived rules in HOL. In: Proceedings of TPHOLs'03, number 2758 in Lecture Notes in Computer Science, 71-86.
  • 35
    • 0348126394 scopus 로고    scopus 로고
    • Isabelle/HOL - A proof assistant for higher-order logic
    • of, Springer, Berlin Heidelberg New York
    • Nipkow T, Paulson LC, Wenzel M (2002) Isabelle/HOL - A proof assistant for higher-order logic, vol 2283 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York
    • (2002) Lecture Notes in Computer Science , vol.2283
    • Nipkow, T.1    Paulson, L.C.2    Wenzel, M.3
  • 36
    • 84957365826 scopus 로고    scopus 로고
    • PVS: Combining specification, proof checking, and model checking
    • Alur R, Henzinger TA (eds) Computer-aided verification, CAV '96, Berlin Heidelberg New York, pp
    • Owre S, Rajan S, Rushby JM, Shankar N, Srivas MK (1996) PVS: Combining specification, proof checking, and model checking. In: Alur R, Henzinger TA (eds) Computer-aided verification, CAV '96, number 1102 in Lecture Notes in Computer Science, Berlin Heidelberg New York, pp 411-414
    • (1996) Lecture Notes in Computer Science , Issue.1102 , pp. 411-414
    • Owre, S.1    Rajan, S.2    Rushby, J.M.3    Shankar, N.4    Srivas, M.K.5
  • 37
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson LC (1998) The inductive approach to verifying cryptographic protocols. J Comput Sec, 6:85-128
    • (1998) J Comput Sec , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 38
    • 0029737169 scopus 로고    scopus 로고
    • Combining partial order reductions with on-the-fly model checking
    • Peled D (1996) Combining partial order reductions with on-the-fly model checking. Formal Methods Sys Des 8:39-64
    • (1996) Formal Methods Sys Des , vol.8 , pp. 39-64
    • Peled, D.1
  • 40
    • 0033344294 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • Roscoe AW, Broadfoot PJ (1999) Proving security protocols with model checkers by data independence techniques. J Comput Sec 7(1):147-190
    • (1999) J Comput Sec , vol.7 , Issue.1 , pp. 147-190
    • Roscoe, A.W.1    Broadfoot, P.J.2
  • 42
    • 84947910414 scopus 로고
    • An integration of model-checking with automated proof checking
    • Wolper ed, Computer-aided verification, CAV '95, of, Springer, Berlin Heidelberg New York, pp
    • Rajan S, Shankar N, Srivas MK (1995) An integration of model-checking with automated proof checking. In: Wolper (ed), Computer-aided verification, CAV '95, vol 939 of Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York, pp 84-97
    • (1995) Lecture Notes in Computer Science , vol.939 , pp. 84-97
    • Rajan, S.1    Shankar, N.2    Srivas, M.K.3
  • 44
    • 33947127229 scopus 로고    scopus 로고
    • Smith G (1997) Derrick J (1997) Refinement and verification of concurrent systems specified in Object-Z and CSP. In: Proceedings of the international conference of formal engineering methods, IEEE Computer Society Press
    • Smith G (1997) Derrick J (1997) Refinement and verification of concurrent systems specified in Object-Z and CSP. In: Proceedings of the international conference of formal engineering methods, IEEE Computer Society Press
  • 47
    • 26444585296 scopus 로고    scopus 로고
    • Alibi establishment for electronic signatures
    • Susaki S, Matsumoto T (2002) Alibi establishment for electronic signatures. Inf Process Soc Jpn 43(8):2381-2393
    • (2002) Inf Process Soc Jpn , vol.43 , Issue.8 , pp. 2381-2393
    • Susaki, S.1    Matsumoto, T.2
  • 49
    • 0022704337 scopus 로고
    • Automata-theoretic techniques for modal logics of programs
    • Vardi MY Wolper P (1986) Automata-theoretic techniques for modal logics of programs. J Comput Syst Sci 32:183-221
    • (1986) J Comput Syst Sci , vol.32 , pp. 183-221
    • Vardi, M.Y.1    Wolper, P.2
  • 50
    • 33947129913 scopus 로고    scopus 로고
    • Woodcock J, Davies J (1996) Using Z. Prentice-Hall International, New Jersey
    • Woodcock J, Davies J (1996) Using Z. Prentice-Hall International, New Jersey
  • 51
    • 0031124820 scopus 로고    scopus 로고
    • A case study in model checking software systems
    • Wing J, Vaziri-Farahani M (1997) A case study in model checking software systems. Sci Comput Program 28:273-299
    • (1997) Sci Comput Program , vol.28 , pp. 273-299
    • Wing, J.1    Vaziri-Farahani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.