메뉴 건너뛰기




Volumn 2845, Issue , 2003, Pages 104-119

Confidentiality levels and deliberate/indeliberate protocol attacks

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 35048872309     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (10)

References (19)
  • 2
    • 84948414101 scopus 로고    scopus 로고
    • Soft Constraints for Security Protocol Analysis: Confidentiality
    • I. V. Ramakrishnan, editor, Proc. of the 3rd International Symposium on Practical Aspects of Declarative Languages (PADL'01), Springer-Verlag
    • G. Bella and S. Bistarelli. Soft Constraints for Security Protocol Analysis: Confidentiality. In I. V. Ramakrishnan, editor, Proc. of the 3rd International Symposium on Practical Aspects of Declarative Languages (PADL'01), volume 1990 of LNCS, pages 108-122. Springer-Verlag, 2001.
    • (2001) LNCS , vol.1990 , pp. 108-122
    • Bella, G.1    Bistarelli, S.2
  • 4
    • 0031095278 scopus 로고    scopus 로고
    • Semiring-based Constraint Solving and Optimization
    • Mar
    • S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based Constraint Solving and Optimization. Journal of the ACM, 44(2):201-236, Mar 1997.
    • (1997) Journal of the ACM , vol.44 , Issue.2 , pp. 201-236
    • Bistarelli, S.1    Montanari, U.2    Rossi, F.3
  • 7
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • D.E. Denning. A Lattice Model of Secure Information Flow. Comm. of ACM, 19(5):236-242, 1976.
    • (1976) Comm. of ACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.E.1
  • 8
    • 0027206949 scopus 로고
    • The Calculus of Fuzzy Restrictions as a Basis for Flexible Constraint Satisfaction
    • IEEE Press
    • D. Dubois, H. Fargier, and H. Prade. The Calculus of Fuzzy Restrictions as a Basis for Flexible Constraint Satisfaction. In Proc. of IEEE International Conference on Fuzzy Systems, pages 1131-1136. IEEE Press, 1993.
    • (1993) Proc. of IEEE International Conference on Fuzzy Systems , pp. 1131-1136
    • Dubois, D.1    Fargier, H.2    Prade, H.3
  • 9
    • 0011121265 scopus 로고    scopus 로고
    • Undecidability of Bounded Security Protocols
    • N. Heintze and E. Clarke, editors
    • N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Undecidability of Bounded Security Protocols. In N. Heintze and E. Clarke, editors, Proc. FMSP'99, 1999.
    • (1999) Proc. FMSP'99
    • Durgin, N.1    Lincoln, P.2    Mitchell, J.3    Scedrov, A.4
  • 12
    • 28144456308 scopus 로고
    • An Attack on the Needham-Schroeder Public-Key Authentication Protocol
    • G. Lowe. An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters, 56(3):131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 13
    • 49449120803 scopus 로고
    • Consistency in Networks of Relations
    • A.K. Mackworth. Consistency in Networks of Relations. Artificial Intelligence, 8(1):99-118, 1977.
    • (1977) Artificial Intelligence , vol.8 , Issue.1 , pp. 99-118
    • Mackworth, A.K.1
  • 14
    • 0016050041 scopus 로고
    • Networks of Constraints: Fundamental Properties and Applications to Picture Processing
    • Also Technical Report, Carnegie Mellon University, 1971
    • U. Montanari. Networks of Constraints: Fundamental Properties and Applications to Picture Processing. Information Science, 7:95-132, 1974. Also Technical Report, Carnegie Mellon University, 1971.
    • (1974) Information Science , vol.7 , pp. 95-132
    • Montanari, U.1
  • 18
    • 0001553684 scopus 로고
    • Possibilistic Constraint Satisfaction Problems, or "How to Handle Soft Constraints?"
    • T. Schiex. Possibilistic Constraint Satisfaction Problems, or "How to Handle Soft Constraints?". In Proc. of 8th Conference on Uncertainty in AI, pages 269-275, 1992.
    • (1992) Proc. of 8th Conference on Uncertainty in AI , pp. 269-275
    • Schiex, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.