-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
ABADI, M. AND GORDON, A. D. 1999. A calculus for cryptographic protocols: The spi calculus. Information and Computation 148, 1-70.
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
ABADI, M.1
GORDON, A.D.2
-
3
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
ABADI, M. AND ROGAWAY, P. 2002. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15, 2, 103-127.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
ABADI, M.1
ROGAWAY, P.2
-
4
-
-
35048861871
-
Just fast keying in the pi calculus
-
13th European Symposium on Programming ESOP'04, Springer, New York
-
ABADI, M., BLANCHET, B., AND FOURNET, C. 2004. Just fast keying in the pi calculus. In 13th European Symposium on Programming (ESOP'04). LNCS, vol. 2986. Springer, New York. 340-354.
-
(2004)
LNCS
, vol.2986
, pp. 340-354
-
-
ABADI, M.1
BLANCHET, B.2
FOURNET, C.3
-
5
-
-
26444497860
-
-
ARMANDO, A., BASIN, D., BOICHUT, Y., CHEVALIER, Y., COMPAGNA, L., CUELLAR, J., HANKES DRIELSMA, P., HEÁM, P.-C., MANTOVANI, J., MÖDERSHEIM, S., VON OHEIMB, D., RUSINOWITCH, M., SANTIAGO, J., TURUANI, M., VIGANÒ, L., AND VIGNERON, L. 2005. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In 17th International Conference on Computer Aided Verification (CAV'05), K. Etessami and S. K. Rajamani, Eds. LNCS, 3576. Springer, New York. Available at http://www.avispa-project.org/publications.html.
-
ARMANDO, A., BASIN, D., BOICHUT, Y., CHEVALIER, Y., COMPAGNA, L., CUELLAR, J., HANKES DRIELSMA, P., HEÁM, P.-C., MANTOVANI, J., MÖDERSHEIM, S., VON OHEIMB, D., RUSINOWITCH, M., SANTIAGO, J., TURUANI, M., VIGANÒ, L., AND VIGNERON, L. 2005. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In 17th International Conference on Computer Aided Verification (CAV'05), K. Etessami and S. K. Rajamani, Eds. LNCS, vol. 3576. Springer, New York. Available at http://www.avispa-project.org/publications.html.
-
-
-
-
7
-
-
33745824225
-
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
-
BACKES, M., MÖDERSHEIM, S., PFITZMANN, B., AND VIGANÒ, L. 2006. Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In Foundations of Software Science and Computation Structures (FOSSACS'06). 428-445.
-
(2006)
Foundations of Software Science and Computation Structures (FOSSACS'06)
, pp. 428-445
-
-
BACKES, M.1
MÖDERSHEIM, S.2
PFITZMANN, B.3
VIGANÒ, L.4
-
8
-
-
34249721199
-
-
BARBIR, A, GOODNER, M, GUDGIN, M, GRANQVIST, H, NADALIN, A, ET AL. 2006. Web Services Secure Conversation Language (WS-SecureConversation) Oasis Committee Draft Version 0.1. At
-
BARBIR, A., GOODNER, M., GUDGIN, M., GRANQVIST, H., NADALIN, A., ET AL. 2006. Web Services Secure Conversation Language (WS-SecureConversation) Oasis Committee Draft Version 0.1. At http://www.oasis-open.org/committees/download.php/ 20158/ws-secureconversation-1.3-spec-cd-01.pdf.
-
-
-
-
9
-
-
84954139111
-
Secure sessions for web services
-
BHARGAVAN, K., CORIN, R., FOURNET, C., AND GORDON, A. D. 2004a. Secure sessions for web services. In 2004 ACM Workshop on Secure Web Services (SWS'04). 56-66.
-
(2004)
2004 ACM Workshop on Secure Web Services (SWS'04)
, pp. 56-66
-
-
BHARGAVAN, K.1
CORIN, R.2
FOURNET, C.3
GORDON, A.D.4
-
10
-
-
33646131882
-
Secure sessions for web services
-
Tech. Rep. MSR-TR-2004-114, Microsoft Research
-
BHARGAVAN, K., CORIN, R., FOURNET, C., AND GORDON, A. D. 2004d. Secure sessions for web services. Tech. Rep. MSR-TR-2004-114, Microsoft Research.
-
(2004)
-
-
BHARGAVAN, K.1
CORIN, R.2
FOURNET, C.3
GORDON, A.D.4
-
12
-
-
35048821943
-
TulaFale: A security tool for web services
-
International Symposium on Formal Methods for Components and Objects FMCO'03, Springer, New York
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., AND PUCELLA, R. 2004d. TulaFale: A security tool for web services. In International Symposium on Formal Methods for Components and Objects (FMCO'03). LNCS, vol. 3188. Springer, New York. 197-222.
-
(2004)
LNCS
, vol.3188
, pp. 197-222
-
-
BHARGAVAN, K.1
FOURNET, C.2
GORDON, A.D.3
PUCELLA, R.4
-
13
-
-
18544363572
-
A semantics for web services authentication
-
June
-
BHARGAVAN, K., FOURNET, C., AND GORDON, A. D. 2005. A semantics for web services authentication. Theor. Comput. Sci. 340, 1 (June), 102-153.
-
(2005)
Theor. Comput. Sci
, vol.340
, Issue.1
, pp. 102-153
-
-
BHARGAVAN, K.1
FOURNET, C.2
GORDON, A.D.3
-
14
-
-
33947683919
-
Verified interoperable implementations of security protocols
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., AND TSE, S. 2006. Verified interoperable implementations of security protocols. In 19th IEEE Computer Security Foundations Workshop (CSFW'06). 139-152.
-
(2006)
19th IEEE Computer Security Foundations Workshop (CSFW'06)
, pp. 139-152
-
-
BHARGAVAN, K.1
FOURNET, C.2
GORDON, A.D.3
TSE, S.4
-
15
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society, Washington, D.C
-
BLANCHET, B. 2001. An efficient cryptographic protocol verifier based on Prolog rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14). IEEE Computer Society, Washington, D.C. 82-96.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW-14)
, pp. 82-96
-
-
BLANCHET, B.1
-
16
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
9th International Static Analysis Symposium SAS'02, Springer, New York
-
BLANCHET, B. 2002. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium (SAS'02). LNCS, vol. 2477. Springer, New York. 342-359.
-
(2002)
LNCS
, vol.2477
, pp. 342-359
-
-
BLANCHET, B.1
-
17
-
-
33751067991
-
A computationally sound mechanized prover for security protocols
-
BLANCHET, B. 2006. A computationally sound mechanized prover for security protocols. In IEEE Symposium on Security and Privacy. 140-154.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 140-154
-
-
BLANCHET, B.1
-
19
-
-
0000523051
-
A logic of authentication
-
BURROWS, M., ABADI, M., AND NEEDHAM, R. 1989. A logic of authentication. Proceedings of the Royal Society of London A 426, 233-271.
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
BURROWS, M.1
ABADI, M.2
NEEDHAM, R.3
-
20
-
-
0033718532
-
TAPS: A first-order verifier for cryptographic protocols
-
IEEE Computer Society Press, Washington, D.C
-
COHEN, E. 2000. TAPS: A first-order verifier for cryptographic protocols. In 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Washington, D.C. 144-158.
-
(2000)
13th IEEE Computer Security Foundations Workshop
, pp. 144-158
-
-
COHEN, E.1
-
21
-
-
34249744190
-
-
DAMIANI, E., DE CAPITANI DI VIMERCATI, S., PARABOSCHI, S., AND SAMARATI, P. 2002. Securing SOAP e-services. International Journal of Information Security 1, 2, 100-115.
-
DAMIANI, E., DE CAPITANI DI VIMERCATI, S., PARABOSCHI, S., AND SAMARATI, P. 2002. Securing SOAP e-services. International Journal of Information Security 1, 2, 100-115.
-
-
-
-
22
-
-
34249752389
-
-
At
-
DAVIS, D., FERRIS, C., GAJJALA, V., GAVRYLYUK, K., GUDGIN, M., KALER, C., LANGWORTHY, D., MORONEY, M., NADALIN, A., ROOTS, J., STOREY, T., VISHWANATH, T., AND WALTER, D. 2005. WS-ReliableMessaging Interop Workshop. At ftp://www6.software.ibm.com/software/developer/library/ws-rmseconscanario.doc.
-
(2005)
WS-ReliableMessaging Interop Workshop
-
-
DAVIS, D.1
FERRIS, C.2
GAJJALA, V.3
GAVRYLYUK, K.4
GUDGIN, M.5
KALER, C.6
LANGWORTHY, D.7
MORONEY, M.8
NADALIN, A.9
ROOTS, J.10
STOREY, T.11
VISHWANATH, T.12
WALTER, D.13
-
23
-
-
0017018484
-
-
DIFFIE, W. AND HELLMAN, M. 1976. New directions in cryptography. IEEE Transactions on Information Theory IT-22, 6 (Nov.), 644-654.
-
DIFFIE, W. AND HELLMAN, M. 1976. New directions in cryptography. IEEE Transactions on Information Theory IT-22, 6 (Nov.), 644-654.
-
-
-
-
25
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
DURGIN, N. A., MITCHELL, J. C., AND PAVLOVIC, D. 2003. A compositional logic for proving security properties of protocols. Journal of Computer Security 11, 4, 677-721.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 677-721
-
-
DURGIN, N.A.1
MITCHELL, J.C.2
PAVLOVIC, D.3
-
27
-
-
34249664652
-
-
FREIER, A. O, KARLTON, P, AND KOCHER, P. C. November 1996. The SSL protocol: Version 3.0
-
FREIER, A. O., KARLTON, P., AND KOCHER, P. C. November 1996. The SSL protocol: Version 3.0. http://home.netscape.com/eng/ssl3/draft302.txt.
-
-
-
-
29
-
-
26844492006
-
Validating a web service security abstraction by typing
-
GORDON, A. D. AND PUCELLA, R. 2005. Validating a web service security abstraction by typing. Formal Aspects of Computing 17, 277-318.
-
(2005)
Formal Aspects of Computing
, vol.17
, pp. 277-318
-
-
GORDON, A.D.1
PUCELLA, R.2
-
31
-
-
34249703740
-
Using WS-Trust and WS-SecureConversation
-
At
-
GUDGIN, M. 2004. Using WS-Trust and WS-SecureConversation. MSDN. At http://msdn.microsoft.com/library/default.asp?url=/library/en- us/dnwebsrv/html/ws-trustandsecureconv.asp.
-
(2004)
MSDN
-
-
GUDGIN, M.1
-
32
-
-
34249704265
-
-
GUDGIN, M, NADALIN, A, ET AL. 2005a. Web Services Secure Conversation Language (WS-SecureConversation) Version 1.2. At
-
GUDGIN, M., NADALIN, A., ET AL. 2005a. Web Services Secure Conversation Language (WS-SecureConversation) Version 1.2. At http://www.oasis-open.org/committees/download.php/17364/lists.oasis-open. orgarchivesws-sx200512zip00000.zip.
-
-
-
-
33
-
-
34249657122
-
-
GUDGIN, M, NADALIN, A, ET AL. 2005b. Web Services Trust Language (WS-Trust) Version 1.2. At
-
GUDGIN, M., NADALIN, A., ET AL. 2005b. Web Services Trust Language (WS-Trust) Version 1.2. At http://www.oasis-open. org/committees/download.php/17364/lists.oasis-open.orgarchivesws- sx200512zip00000.zip.
-
-
-
-
34
-
-
34249736128
-
-
GUDGIN, M, NADALIN, A, ET AL. 2005e. Web Services Trust Language (WS-Trust) Version 1.2. At
-
GUDGIN, M., NADALIN, A., ET AL. 2005e. Web Services Trust Language (WS-Trust) Version 1.2. At http://www.oasis-open. org/committees/download.php/20160/ws-trust-1.3-spec-cd-01.pdf.
-
-
-
-
36
-
-
0035067667
-
Fault-preserving simplifying transformations for security protocols
-
HUI, M. L. AND LOWE, G. 2001. Fault-preserving simplifying transformations for security protocols. Journal of Computer Security 9, 1/2, 3-46.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 3-46
-
-
HUI, M.L.1
LOWE, G.2
-
37
-
-
18744401987
-
Formal specification of a web services protocol
-
University of Pisa
-
JOHNSON, J. E., LANGWORTHY, D. E., LAMPORT, L., AND VOGT, F. H. 2004. Formal specification of a web services protocol. In 1st International Workshop on Web Services and Formal Methods (WS-FM 2004). University of Pisa.
-
(2004)
1st International Workshop on Web Services and Formal Methods (WS-FM 2004)
-
-
JOHNSON, J.E.1
LANGWORTHY, D.E.2
LAMPORT, L.3
VOGT, F.H.4
-
38
-
-
34249654831
-
-
KALER, C, NADALIN, A, ET AL. 2003a. Web Services Federation Language (WS-Federation) Version 1.0. At
-
KALER, C., NADALIN, A., ET AL. 2003a. Web Services Federation Language (WS-Federation) Version 1.0. At http://msdn.microsoft.com/ws/2003/07/ws-federation/.
-
-
-
-
39
-
-
34249707066
-
-
KALER, C, NADALIN, A, ET AL. 2003b. WS-Federation: Passive Requestor Profile Version 1.0. At
-
KALER, C., NADALIN, A., ET AL. 2003b. WS-Federation: Passive Requestor Profile Version 1.0. At ftp://www6.software.ibm.com/software/developer/library/ws-fedpass.pdf.
-
-
-
-
40
-
-
34249660303
-
-
KALER, C, NADALIN, A, ET AL. 2004a. Web Services Secure Conversation Language (WS-SecureConversation) Version 1.1. At
-
KALER, C., NADALIN, A., ET AL. 2004a. Web Services Secure Conversation Language (WS-SecureConversation) Version 1.1. At http://msdn.microsoft.com/ws/2004/04/ws-secure-conversation/.
-
-
-
-
41
-
-
34249719751
-
-
KALER, C, NADALIN, A, ET AL. 2004b. Web Services Trust Language (WS-Trust) Version 1.1. At
-
KALER, C., NADALIN, A., ET AL. 2004b. Web Services Trust Language (WS-Trust) Version 1.1. At http://msdn.microsoft. com/ws/2004/04/ws-trust/.
-
-
-
-
42
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
KEMMERER, R., MEADOWS, C., AND MILLEN, J. 1994. Three systems for cryptographic protocol analysis. Journal of Cryptology 7, 2, 79-130.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
KEMMERER, R.1
MEADOWS, C.2
MILLEN, J.3
-
46
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
-
Tools and Algorithms for the Construction and Analysis of Systems, Springer, New York
-
LOWE, G. 1996. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In Tools and Algorithms for the Construction and Analysis of Systems. LNCS, vol. 1055. Springer, New York. 147-166.
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
LOWE, G.1
-
48
-
-
33646239197
-
-
Microsoft Corporation, Microsoft Corporation. At
-
Microsoft Corporation 2004. Web Services Enhancements (WSE) 2.0 SP1. Microsoft Corporation. At http://msdn.microsoft.com/webservices/ building/wse/default.aspx.
-
(2004)
Web Services Enhancements (WSE) 2.0 SP1
-
-
-
50
-
-
21244462147
-
-
At
-
NADALIN, A., KALER, C., HALLAM-BAKER, P., AND MONZILLO, R. 2004. OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004). OASIS Standard 200401. At http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1. 0.pdf.
-
(2004)
OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004). OASIS Standard 200401
-
-
NADALIN, A.1
KALER, C.2
HALLAM-BAKER, P.3
MONZILLO, R.4
-
51
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
NEEDHAM, R. AND SCHROEDER, M. 1978. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12, 993-999.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
NEEDHAM, R.1
SCHROEDER, M.2
-
52
-
-
34249741269
-
-
OASIS Security Services TC 2005. Security Assertion Markup Language FAQ. OASIS Security Services TC. At http://www.oasis-open.org/committees/ security/faq.php.
-
OASIS Security Services TC 2005. Security Assertion Markup Language FAQ. OASIS Security Services TC. At http://www.oasis-open.org/committees/ security/faq.php.
-
-
-
-
53
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
PAULSON, L. 1998. The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6, 85-128.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
PAULSON, L.1
-
54
-
-
85024252307
-
Inductive analysis of the internet protocol TLS
-
PAULSON, L. C. 1999. Inductive analysis of the internet protocol TLS. ACM Trans. Inf. Syst. Secur. 2, 3, 332-351.
-
(1999)
ACM Trans. Inf. Syst. Secur
, vol.2
, Issue.3
, pp. 332-351
-
-
PAULSON, L.C.1
-
55
-
-
0003777431
-
-
Pearson Education
-
RYAN, P. Y. A., SCHNEIDER, S. A., GOLDSMITH, M. H., LOWE, G., AND ROSCOE, A. W. 2001. The Modeling and Analysis of Security Protocols: the CSP Approach. Pearson Education.
-
(2001)
The Modeling and Analysis of Security Protocols: The CSP Approach
-
-
RYAN, P.Y.A.1
SCHNEIDER, S.A.2
GOLDSMITH, M.H.3
LOWE, G.4
ROSCOE, A.W.5
-
56
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
THAYER FÁBREGA, F., HERZOG, J., AND GUTTMAN, J. 1999. Strand spaces: Proving security protocols correct. Journal of Computer Security 7, 191-230.
-
(1999)
Journal of Computer Security
, vol.7
, pp. 191-230
-
-
THAYER FÁBREGA, F.1
HERZOG, J.2
GUTTMAN, J.3
-
57
-
-
1142277649
-
Web services are not distributed objects
-
VOGELS, W. 2003. Web services are not distributed objects. IEEE Internet Computing 7, 6, 59-66.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.6
, pp. 59-66
-
-
VOGELS, W.1
-
58
-
-
34249711615
-
-
W3C 2003. SOAP Version 1.2. W3C. W3C Recommendation, at
-
W3C 2003. SOAP Version 1.2. W3C. W3C Recommendation, at http://www.w3.org/TR/soap12.
-
-
-
|