메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Towards security analyses of an identity federation protocol for web services in convergent networks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; ALGEBRA; IDENTIFICATION (CONTROL SYSTEMS); WEB SERVICES;

EID: 34548266564     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AICT.2007.46     Document Type: Conference Paper
Times cited : (2)

References (29)
  • 1
    • 84957872542 scopus 로고    scopus 로고
    • Reasoning about Cryptographic Protocols in the Spi Calculus
    • Proc. CONCUR'97, Springer
    • M. Abadi and A. D. Gordon, "Reasoning about Cryptographic Protocols in the Spi Calculus," in Proc. CONCUR'97, ser. LNCS, vol. 1243. Springer, 1997, pp. 59-73.
    • (1997) ser. LNCS , vol.1243 , pp. 59-73
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 84974597207 scopus 로고    scopus 로고
    • Non Interference for the Analysis of Cryptographic Protocols
    • Proc. ICALP'OO, Springer
    • R. Focardi, R. Gorrieri, and F. Martinelli, "Non Interference for the Analysis of Cryptographic Protocols," in Proc. ICALP'OO, ser. LNCS, vol. 1853. Springer, 2000, pp. 354-372.
    • (2000) ser. LNCS , vol.1853 , pp. 354-372
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 3
    • 84948972230 scopus 로고    scopus 로고
    • Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques
    • Proc. TACAS'99, Springer
    • D. Marchignoli and F. Martinelli, "Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques," in Proc. TACAS'99, ser. LNCS, vol. 1579. Springer, 1999, pp. 148-162.
    • (1999) ser. LNCS , vol.1579 , pp. 148-162
    • Marchignoli, D.1    Martinelli, F.2
  • 4
    • 84955602379 scopus 로고
    • Formal Verification of Cryptographic Protocols: A Survey
    • Proc. ASIACRYPT'94, Springer
    • C. Meadows, "Formal Verification of Cryptographic Protocols: a Survey," in Proc. ASIACRYPT'94, ser. LNCS, vol. 917. Springer, 1995, pp. 135-150.
    • (1995) ser. LNCS , vol.917 , pp. 135-150
    • Meadows, C.1
  • 5
    • 35848959071 scopus 로고    scopus 로고
    • Using CSP to Detect Errors in the TMN Protocol
    • G. Lowe and A. W. Roscoe, "Using CSP to Detect Errors in the TMN Protocol," Software Engineering, vol. 23, no. 10, pp. 659-669, 1997.
    • (1997) Software Engineering , vol.23 , Issue.10 , pp. 659-669
    • Lowe, G.1    Roscoe, A.W.2
  • 6
    • 0031627781 scopus 로고    scopus 로고
    • Efficient Finite State Analysis for Large Security Protocols
    • IEEE Press
    • V. Shmatikov and U. Stern, "Efficient Finite State Analysis for Large Security Protocols," in Proc. CSFW'98. IEEE Press, 1998, pp. 105-116.
    • (1998) Proc. CSFW'98 , pp. 105-116
    • Shmatikov, V.1    Stern, U.2
  • 7
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • F. J. Thayer, J. C. Herzog, and J. D. Guttman, "Strand spaces: proving security protocols correct," Journal of Computer Security, vol. 7, no. 1, pp. 191-230, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 191-230
    • Thayer, F.J.1    Herzog, J.C.2    Guttman, J.D.3
  • 8
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proc. TACAS'96, Springer
    • G. Lowe, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR," in Proc. TACAS'96, ser. LNCS, vol. 1055. Springer, 1996, pp. 147-166.
    • (1996) ser. LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 9
    • 0030705405 scopus 로고    scopus 로고
    • Automated Analysis of Cryptographic Protocols using Murphi
    • IEEE Press
    • J. C. Mitchell, M. Mitchell, and U. Stern, "Automated Analysis of Cryptographic Protocols using Murphi," in Proc. S&P'97. IEEE Press, 1997, pp. 141-153.
    • (1997) Proc. S&P'97 , pp. 141-153
    • Mitchell, J.C.1    Mitchell, M.2    Stern, U.3
  • 12
    • 85031620050 scopus 로고
    • A Semantics for a Logic of Authentication
    • ACM Press
    • M. Abadi and M. R. Turtle, "A Semantics for a Logic of Authentication," in Proc. SPDC'91. ACM Press, 1991, pp. 201-216.
    • (1991) Proc. SPDC'91 , pp. 201-216
    • Abadi, M.1    Turtle, M.R.2
  • 14
    • 0030705795 scopus 로고    scopus 로고
    • Proving Properties of Security Protocols by Induction
    • IEEE Press
    • L. C. Paulson, "Proving Properties of Security Protocols by Induction," in Proc. CSFW'97. IEEE Press, 1997, pp. 70-83.
    • (1997) Proc. CSFW'97 , pp. 70-83
    • Paulson, L.C.1
  • 15
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by Typing in Security Protocols
    • M. Abadi, "Secrecy by Typing in Security Protocols," Journal of the ACM, vol. 46, no. 5, pp. 749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 16
    • 0035838828 scopus 로고    scopus 로고
    • Static Analysis for the pi-Calculus with Applications to Security
    • C. Bodei, P. Degano, F. Nielson, and H. R. Nielson, "Static Analysis for the pi-Calculus with Applications to Security," Information and Computation, vol. 168, no. 1, pp. 68-92, 2001.
    • (2001) Information and Computation , vol.168 , Issue.1 , pp. 68-92
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 17
    • 34548239383 scopus 로고    scopus 로고
    • A Team Automaton Scenario for the Analysis of Security Properties in Communication Protocols
    • accepted for publication
    • M. H. ter Beek, G. Lenzini, and M. Petrocchi, "A Team Automaton Scenario for the Analysis of Security Properties in Communication Protocols," Journal of Automata, Languages and Combinatorics, accepted for publication, 2006.
    • (2006) Journal of Automata, Languages and Combinatorics
    • ter Beek, M.H.1    Lenzini, G.2    Petrocchi, M.3
  • 18
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach for the definition of security properties
    • Proc. FM'99, Springer
    • R. Focardi and F. Martinelli, "A uniform approach for the definition of security properties," in Proc. FM'99, ser. LNCS, vol. 1708. Springer, 1999, pp. 794-813.
    • (1999) ser. LNCS , vol.1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 19
    • 0037209815 scopus 로고    scopus 로고
    • Analysis of security protocols as open systems
    • F. Martinelli, "Analysis of security protocols as open systems," Theoretical Computer Science, vol. 290, no. 1, pp. 1057-1106, 2003.
    • (2003) Theoretical Computer Science , vol.290 , Issue.1 , pp. 1057-1106
    • Martinelli, F.1
  • 22
    • 34548224360 scopus 로고    scopus 로고
    • Liberty Alliance Project, Online, Available
    • Liberty Alliance Project. [Online]. Available: www.projectliberty.org
  • 23
    • 34548267813 scopus 로고    scopus 로고
    • T. Wason et al. (2005) Liberty ID-FF Architecture Overview v1.2. [Online]. Available: www.projectliberty.org/liberty/specifications.-l
    • T. Wason et al. (2005) Liberty ID-FF Architecture Overview v1.2. [Online]. Available: www.projectliberty.org/liberty/specifications.-l
  • 24
    • 34548225645 scopus 로고    scopus 로고
    • OASIS Security Services TC. (2005) Security Assertion Markup Language SAML v2.0. [Online]. Available: www.oasis-open.org/specs/
    • OASIS Security Services TC. (2005) Security Assertion Markup Language SAML v2.0. [Online]. Available: www.oasis-open.org/specs/
  • 25
    • 0020720357 scopus 로고
    • On the Security of Public Key Protocols
    • D. Dolev and A. Yao, "On the Security of Public Key Protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 26
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public key authentication protocol
    • G. Lowe, "An attack on the Needham-Schroeder public key authentication protocol," Information Processing Letters, vol. 56, no. 3, pp. 131-136, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-136
    • Lowe, G.1
  • 28
    • 0029193016 scopus 로고
    • Partial Model Checking
    • IEEE Press
    • H. R. Andersen, "Partial Model Checking," in Proc. LICS'95. IEEE Press, 1995, pp. 398-407.
    • (1995) Proc. LICS'95 , pp. 398-407
    • Andersen, H.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.