메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 139-152

Verified interoperable implementations of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC ALGORITHMS; CRYPTOGRAPHIC PROTOCOLS; INTEROPERABILITY TESTING; SECURITY PROTOCOLS;

EID: 33947683919     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2006.32     Document Type: Conference Paper
Times cited : (65)

References (40)
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 5
    • 33646080360 scopus 로고    scopus 로고
    • Security-typed languages for implementation of cryptographic protocols: A case study
    • 10th European Symposium on Research in Computer Security ESORICS'05, of, Springer
    • A. Askarov and A. Sabelfeld. Security-typed languages for implementation of cryptographic protocols: A case study. In 10th European Symposium on Research in Computer Security (ESORICS'05), volume 3679 of LNCS, pages 197-221. Springer, 2005.
    • (2005) LNCS , vol.3679 , pp. 197-221
    • Askarov, A.1    Sabelfeld, A.2
  • 9
    • 18544363572 scopus 로고    scopus 로고
    • A semantics for web services authentication
    • June
    • K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. Theoretical Comput. Sci., 340(1):102-153, June 2005.
    • (2005) Theoretical Comput. Sci , vol.340 , Issue.1 , pp. 102-153
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 10
    • 35048821943 scopus 로고    scopus 로고
    • TulaFale: A security tool for web services
    • International Symposium on Formal Methods for Components and Objects FMCO'03, of, Springer
    • K. Bhargavan, C. Fournet, A. D. Gordon, and R. Pucella. TulaFale: A security tool for web services. In International Symposium on Formal Methods for Components and Objects (FMCO'03), volume 3188 of LNCS, pages 197-222. Springer, 2004.
    • (2004) LNCS , vol.3188 , pp. 197-222
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Pucella, R.4
  • 11
    • 33947663592 scopus 로고    scopus 로고
    • Verified interoperable implementations of security protocols
    • Technical Report MSR-TR-2006-46, Microsoft Research
    • K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. Technical Report MSR-TR-2006-46, Microsoft Research, 2006.
    • (2006)
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Tse, S.4
  • 14
    • 13644264990 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • B. Blanchet and A. Podelski. Verification of cryptographic protocols: Tagging enforces termination. Theoretical Computer Science, 333(1-2):67-90, 2005.
    • (2005) Theoretical Computer Science , vol.333 , Issue.1-2 , pp. 67-90
    • Blanchet, B.1    Podelski, A.2
  • 16
  • 17
    • 33947616793 scopus 로고    scopus 로고
    • D. Eastlake, J. Reagle, et al. XML Encryption Syntax and Processing, 2002. W3C Recommendation.
    • D. Eastlake, J. Reagle, et al. XML Encryption Syntax and Processing, 2002. W3C Recommendation.
  • 18
    • 33947684372 scopus 로고    scopus 로고
    • D. Eastlake, J. Reagle, D. Solo, et al. XML-Signature Syntax and Processing, 2002. W3C Recommendation.
    • D. Eastlake, J. Reagle, D. Solo, et al. XML-Signature Syntax and Processing, 2002. W3C Recommendation.
  • 19
    • 33947702621 scopus 로고    scopus 로고
    • Galois Connections. Cryptol Reference Manual, 2005.
    • Galois Connections. Cryptol Reference Manual, 2005.
  • 20
    • 1442286773 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • P. Giambiagi and M. Dam. On the secure implementation of security protocols. Science of Computer Programming, 50:73-99, 2004.
    • (2004) Science of Computer Programming , vol.50 , pp. 73-99
    • Giambiagi, P.1    Dam, M.2
  • 21
    • 0141998527 scopus 로고    scopus 로고
    • Validating a web service security abstraction by typing
    • A. D. Gordon and R. Pucella. Validating a web service security abstraction by typing. In 2002 ACM workshop on XML Security, pages 18-29, 2002.
    • (2002) 2002 ACM workshop on XML Security , pp. 18-29
    • Gordon, A.D.1    Pucella, R.2
  • 22
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real C code
    • 6th International. Conference on Verification, Model Checking and Abstract Interpretation VMCAI'05, of, Springer
    • J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In 6th International. Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 of LNCS, pages 363-379. Springer, 2005.
    • (2005) LNCS , vol.3385 , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 23
    • 33947671911 scopus 로고    scopus 로고
    • M. Gudgin et al. SOAP Version 1.2, 2003. W3C Recommendation
    • M. Gudgin et al. SOAP Version 1.2, 2003. W3C Recommendation.
  • 24
    • 33646176467 scopus 로고    scopus 로고
    • Programming cryptographic protocols
    • Trusted Global Computing TGC'05, of, Springer
    • J. D. Guttman, J. C. Herzog, J. D. Ramsdell, and B. T. Sniffen. Programming cryptographic protocols. In Trusted Global Computing (TGC'05), volume 3705 of LNCS, pages 116-145. Springer, 2005.
    • (2005) LNCS , vol.3705 , pp. 116-145
    • Guttman, J.D.1    Herzog, J.C.2    Ramsdell, J.D.3    Sniffen, B.T.4
  • 28
    • 33947683344 scopus 로고    scopus 로고
    • Microsoft Corporation. Web Services Enhancements (WSE) 2.0, 2004. At http://msdn.microsoft.com/webservices/building/wse/default.aspx.
    • Microsoft Corporation. Web Services Enhancements (WSE) 2.0, 2004. At http://msdn.microsoft.com/webservices/building/wse/default.aspx.
  • 31
    • 3042673595 scopus 로고    scopus 로고
    • Cryptographic protocol generation from CAPSL
    • Technical Report SRI-CSL-01-07, SRI, 2001
    • F. Muller and J. Millen. Cryptographic protocol generation from CAPSL. Technical Report SRI-CSL-01-07, SRI, 2001.
    • Muller, F.1    Millen, J.2
  • 33
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 34
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • D. Otway and O. Rees. Efficient and timely mutual authentication. Operation Systems Review, 21(1):8-10, 1987.
    • (1987) Operation Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 35
    • 84958777572 scopus 로고    scopus 로고
    • AGVI - automatic generation, verification, and implementation of security protocols
    • 13th Conference on Computer Aided Verification CAV, Springer
    • A. Perrig, D. Song, and D. Phan. AGVI - automatic generation, verification, and implementation of security protocols. In 13th Conference on Computer Aided Verification (CAV), LNCS, pages 241-245. Springer, 2001.
    • (2001) LNCS , pp. 241-245
    • Perrig, A.1    Song, D.2    Phan, D.3
  • 39
    • 33947670490 scopus 로고    scopus 로고
    • D. Syme. F#, 2005. At http://research, microsoft.com/projects/ilx/fsharp. aspx.
    • D. Syme. F#, 2005. At http://research, microsoft.com/projects/ilx/fsharp. aspx.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.