메뉴 건너뛰기




Volumn 2946, Issue , 2004, Pages 139-185

Classification of security properties (Part II: Network security)

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 35048815468     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24631-2_4     Document Type: Article
Times cited : (29)

References (47)
  • 1
    • 84957872542 scopus 로고    scopus 로고
    • Reasoning about cryptographic protocols in the spi calculus
    • Proceedings of CONCUR'97
    • M. Abadi and A. D. Gordon. Reasoning about cryptographic protocols in the spi calculus. In Proceedings of CONCUR'97, pages 59-73. Lecture Notes in Computer Science 1243, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1243 , pp. 59-73
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 3042529082 scopus 로고    scopus 로고
    • Process-algebraic Approach for the Analysis of Probabilistic Non-interference
    • A. Aldini, M. Bravetti, R. Gorrieri. A Process-algebraic Approach for the Analysis of Probabilistic Non-interference. To appear on Journal of Computer Security, 2003.
    • (2003) Journal of Computer Security
    • Aldini, A.1    Bravetti, M.2    Gorrieri A, R.3
  • 4
    • 84944050367 scopus 로고    scopus 로고
    • Probabilistic Information Flow in a Process Algebra
    • 12th Int. Conference on Concurrency Theory (CONCUR'01), Aalborg, Denmark, August
    • A. Aldini. Probabilistic Information Flow in a Process Algebra. In 12th Int. Conference on Concurrency Theory (CONCUR'01), Springer LNCS 2154:152-168, Aalborg, Denmark, August 2001.
    • (2001) Springer LNCS , vol.2154 , pp. 152-168
    • Aldini, A.1
  • 8
    • 35048847727 scopus 로고    scopus 로고
    • Context-Sensitive Equivalences for Non-interference based Protocol Analysis
    • Proc. of the 14th International Symposium on Fundamentals of Computation Theory, FCT 2003, Springer-Verlag
    • M. Bugliesi, A. Ceccato, and S. Rossi. Context-Sensitive Equivalences for Non-interference based Protocol Analysis. In Proc. of the 14th International Symposium on Fundamentals of Computation Theory, FCT 2003, LNCS 2751, pag. 364-375, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2751 , pp. 364-375
    • Bugliesi, M.1    Ceccato, A.2    Rossi, S.3
  • 13
    • 0032659620 scopus 로고    scopus 로고
    • CVS: A compiler for the analysis of cryptographic protocols
    • IEEE press
    • A. Durante, R. Focardi, and R. Gorrieri. CVS: A compiler for the analysis of cryptographic protocols. In Proceedings of CSFW'99, pages 203-212. IEEE press, 1999.
    • (1999) Proceedings of CSFW'99 , pp. 203-212
    • Durante, A.1    Focardi, R.2    Gorrieri, R.3
  • 14
    • 35048902864 scopus 로고    scopus 로고
    • CVS at Work: A Report on new Failures upon some Cryptographic Protocols
    • Procs. International Workshop Mathematical Methods, Models and Architectures for Computer Networks Security, Springer, St. Petersburg, Russia
    • A. Durante, R. Focardi, and R. Gorrieri. CVS at Work: A Report on new Failures upon some Cryptographic Protocols. In Procs. International Workshop Mathematical Methods, Models and Architectures for Computer Networks Security, LNCS 2052, 287-299, Springer, St. Petersburg, Russia, 2001.
    • (2001) LNCS , vol.2052 , pp. 287-299
    • Durante, A.1    Focardi, R.2    Gorrieri, R.3
  • 17
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1):5-33, 1994/1995.
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 18
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9):550-571, 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 19
    • 84988393004 scopus 로고    scopus 로고
    • Classification of Security Properties. Part I: Information Flow
    • Foundations of Security Analysis and Design (R. Focardi, R. Gorrieri eds), Springer
    • R. Focardi, R. Gorrieri. Classification of Security Properties. Part I: Information Flow, in Foundations of Security Analysis and Design (R. Focardi, R. Gorrieri eds), LNCS 2171, 331-396, Springer, 2001.
    • (2001) LNCS , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 20
    • 0037421091 scopus 로고    scopus 로고
    • A Comparison of Three Authentication Properties
    • January Elsevier Science
    • R. Focardi, R. Gorrieri, and F. Martinelli. A Comparison of Three Authentication Properties. Theoretical Computer Science, Volume 291(3), Pages 285-327, January 2003, Elsevier Science.
    • (2003) Theoretical Computer Science , vol.291 , Issue.3 , pp. 285-327
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 22
    • 26844480899 scopus 로고    scopus 로고
    • Message authentication through non-interference
    • Proceedings of 8th International Conference in Algebraic Methodology and Software Technology (AMAST 2000)
    • R. Focardi, R. Gorrieri, and F. Martinelli. Message authentication through non-interference. In Proceedings of 8th International Conference in Algebraic Methodology and Software Technology (AMAST 2000), pages 258-272. Springer Lecture Notes in Computer Science 1816, 2000.
    • (2000) Springer Lecture Notes in Computer Science , vol.1816 , pp. 258-272
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 23
    • 84974597207 scopus 로고    scopus 로고
    • Non interference for the analysis of cryptographic protocols
    • proceedings of 27th International Colloquium on Automata, Languages and Programming (ICALP'00), (U. Montanari, ed.), July
    • R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In proceedings of 27th International Colloquium on Automata, Languages and Programming (ICALP'00), (U. Montanari, ed.), pages 354-372. Lecture Notes in Computer Science 1853, July 2000.
    • (2000) Lecture Notes in Computer Science , vol.1853 , pp. 354-372
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 24
    • 1442267745 scopus 로고    scopus 로고
    • Secrecy in security protocols as non-interference
    • Workshop on secure architectures and information flow
    • R. Focardi, R. Gorrieri, and F. Martinelli. Secrecy in security protocols as non-interference. Workshop on secure architectures and information flow, ENTCS 32, 2000.
    • (2000) ENTCS , vol.32
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 25
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach for the definition of security properties
    • Proceedings of World Congress on Formal Methods (FM'99), Springer
    • R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proceedings of World Congress on Formal Methods (FM'99), pages 794-813. Springer, Lecture Notes in Computer Science 1708, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 28
    • 19144370194 scopus 로고    scopus 로고
    • On the verification of cryptographic protocols - A tale of two committees
    • Workshop on secure architectures and information flow
    • D. Gollman. On the verification of cryptographic protocols - a tale of two committees. In Workshop on secure architectures and information flow, volume 32 of ENTCS, 2000.
    • (2000) ENTCS , vol.32
    • Gollman, D.1
  • 29
    • 35248873844 scopus 로고    scopus 로고
    • A Simple Language for Real-Time Cryptographic Protocol Analysis
    • Proceedings of 12th European Symposium on Programming, (ESOP 2003), April
    • R. Gorrieri, E. Locatelli, F. Martinelli. A Simple Language for Real-Time Cryptographic Protocol Analysis. In Proceedings of 12th European Symposium on Programming, (ESOP 2003), Springer LNCS 2618, pages 114-128, April 2003.
    • (2003) Springer LNCS , vol.2618 , pp. 114-128
    • Gorrieri, R.1    Locatelli, E.2    Martinelli, F.3
  • 30
    • 35048903801 scopus 로고    scopus 로고
    • Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols
    • procs. 28th International Symposium on Mathematical Foundations of Computer Science (MFCS03), Springer, Bratislava (SK), August
    • R. Gorrieri, F. Martinelli. Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols. In procs. 28th International Symposium on Mathematical Foundations of Computer Science (MFCS03), LNCS 2747, 46-67, Springer, Bratislava (SK), August 2003.
    • (2003) LNCS , vol.2747 , pp. 46-67
    • Gorrieri, R.1    Martinelli, F.2
  • 32
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceedings of TACAS'96
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS'96, pages 146-166. Lecture Notes in Computer Science 1055, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 146-166
    • Lowe, G.1
  • 35
    • 0037209815 scopus 로고    scopus 로고
    • Analysis of security protocols as open systems
    • F. Martinelli. Analysis of security protocols as open systems. Theoretical Computer Science 290(1): 1057-1106 (2003)
    • (2003) Theoretical Computer Science , vol.290 , Issue.1 , pp. 1057-1106
    • Martinelli, F.1
  • 36
    • 0000544858 scopus 로고    scopus 로고
    • Languages for description and analysis of authentication protocols
    • World Scientific
    • F. Martinelli. Languages for description and analysis of authentication protocols. In Proceedings of ICTCS'98, pages 304-315. World Scientific, 1998.
    • (1998) Proceedings of ICTCS'98 , pp. 304-315
    • Martinelli, F.1
  • 37
    • 0031645024 scopus 로고    scopus 로고
    • Partial model checking and theorem proving for ensuring security properties
    • IEEE press
    • F. Martinelli. Partial model checking and theorem proving for ensuring security properties. In Proceedings of CSFW'98, pages 44-52. IEEE press, 1998.
    • (1998) Proceedings of CSFW'98 , pp. 44-52
    • Martinelli, F.1
  • 39
    • 0032646572 scopus 로고    scopus 로고
    • Process algebra and non-interference
    • IEEE press
    • P. Y. A. Ryan and S. Schneider. Process algebra and non-interference. In Proceedings of CSFW'99, pages 214-227. IEEE press, 1999.
    • (1999) Proceedings of CSFW'99 , pp. 214-227
    • Ryan, P.Y.A.1    Schneider, S.2
  • 41
    • 0031633214 scopus 로고    scopus 로고
    • Formal analysis of a non-repudiation protocol
    • IEEE Press
    • S. Schneider. Formal analysis of a non-repudiation protocol. In Proceedings of CSFW'98, pages 54-65. IEEE Press, 1998.
    • (1998) Proceedings of CSFW' , vol.98 , pp. 54-65
    • Schneider, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.