메뉴 건너뛰기




Volumn 4720 LNAI, Issue , 2007, Pages 133-147

Towards an automatic analysis of Web service security

Author keywords

Combination of decision procedures; Cryptographic protocols; Equational theories; Rewriting; Security; Verification; Web services

Indexed keywords

CRYPTOGRAPHY; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA; VERIFICATION; XML;

EID: 38049024456     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74621-8_9     Document Type: Conference Paper
Times cited : (8)

References (19)
  • 1
    • 35048821943 scopus 로고    scopus 로고
    • Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: Tulafale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, 3188, pp. 197-222. Springer, Heidelberg (2004)
    • Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: Tulafale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol. 3188, pp. 197-222. Springer, Heidelberg (2004)
  • 2
    • 0032671775 scopus 로고    scopus 로고
    • Cervesato, I., Durgin, N.A., Lincoln, P., Mitchell, J.C., Scedrov, A.: A metanotation for protocol analysis. In: CSFW, pp. 55-69 (1999)
    • Cervesato, I., Durgin, N.A., Lincoln, P., Mitchell, J.C., Scedrov, A.: A metanotation for protocol analysis. In: CSFW, pp. 55-69 (1999)
  • 3
    • 26444458330 scopus 로고    scopus 로고
    • Combining intruder theories
    • Caires, L, Italiano, C.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Chevalier, Y., Rusinowitch, M.: Combining intruder theories. In: Caires, L., Italiano, C.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 639-651. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 639-651
    • Chevalier, Y.1    Rusinowitch, M.2
  • 4
    • 33646262130 scopus 로고    scopus 로고
    • Basin, D.A., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, C., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), 3835, pp. 549-564. Springer, Heidelberg (2005)
    • Basin, D.A., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, C., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol. 3835, pp. 549-564. Springer, Heidelberg (2005)
  • 5
    • 24944569389 scopus 로고    scopus 로고
    • Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, 3467, Springer, Heidelberg (2005)
    • Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, Springer, Heidelberg (2005)
  • 6
    • 20144373910 scopus 로고    scopus 로고
    • Abstraction and resolution modulo ac: How to verify diffie-hellman-like protocols automatically
    • Goubault-Larrecq, J., Roger, M., Verma, K.N.: Abstraction and resolution modulo ac: How to verify diffie-hellman-like protocols automatically. J. Log. Algebr. Program. 64(2), 219-251 (2005)
    • (2005) J. Log. Algebr. Program , vol.64 , Issue.2 , pp. 219-251
    • Goubault-Larrecq, J.1    Roger, M.2    Verma, K.N.3
  • 7
    • 0030078047 scopus 로고    scopus 로고
    • Unification in the union of disjoint equational theories
    • Baader, F., Schulz, K.U.: Unification in the union of disjoint equational theories. J. Symb. Comput. 21(2), 211-243 (1996)
    • (1996) J. Symb. Comput , vol.21 , Issue.2 , pp. 211-243
    • Baader, F.1    Schulz, K.U.2
  • 9
    • 38049088737 scopus 로고    scopus 로고
    • Towards an Automatic Analysis of Web Service Security
    • Technical report, INRIA
    • Chevalier, Y., Lugiez, D., Rusinowitch, M.: Towards an Automatic Analysis of Web Service Security. Technical report, INRIA (2007), http://www.inria.fr/ rrrt/liste-2007.html
    • (2007)
    • Chevalier, Y.1    Lugiez, D.2    Rusinowitch, M.3
  • 11
    • 84957640213 scopus 로고    scopus 로고
    • Weidenbach, C.: Towards an automatic analysis of security protocols in first-order logic. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), 1632, pp. 314-328. Springer, Heidelberg (1999)
    • Weidenbach, C.: Towards an automatic analysis of security protocols in first-order logic. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), vol. 1632, pp. 314-328. Springer, Heidelberg (1999)
  • 12
    • 38049037747 scopus 로고    scopus 로고
    • Dershowitz, N., Jouannaud, J.P.: Rewrite systems. In: Handbook of Theoretical Computer Science, B, pp. 243-320. Elsevier, Amsterdam (1990)
    • Dershowitz, N., Jouannaud, J.P.: Rewrite systems. In: Handbook of Theoretical Computer Science, vol. B, pp. 243-320. Elsevier, Amsterdam (1990)
  • 14
    • 24144477933 scopus 로고    scopus 로고
    • analysis with an abelian group operator or Diffie-Hellman exponentiation. Journal of Computer Security
    • Milien, J., Shmatikov, V.: Symbolic protocol analysis with an abelian group operator or Diffie-Hellman exponentiation. Journal of Computer Security (2005)
    • (2005) Symbolic protocol
    • Milien, J.1    Shmatikov, V.2
  • 16
    • 38049086587 scopus 로고    scopus 로고
    • A symbolic intruder model for hash-collision attacks
    • 11th Annual Asian Computing Science Conference, Springer, Heidelberg
    • Chevalier, Y., Kourjieh, M.: A symbolic intruder model for hash-collision attacks. In: 11th Annual Asian Computing Science Conference. LNCS, Springer, Heidelberg (2006) ftp://ftp.irit.fr/IRIT/LILAC/main.pdf
    • (2006) LNCS
    • Chevalier, Y.1    Kourjieh, M.2
  • 17
    • 38049006849 scopus 로고    scopus 로고
    • Associative-commutative deducibility constraints
    • Thomas, W, Weil, P, eds, STACS 2007, Springer, Heidelberg
    • Bursuc, S., Comon-Lundh, H., Delaune, S.: Associative-commutative deducibility constraints. In: Thomas, W., Weil, P. (eds.) STACS 2007. LNCS, vol. 4393, pp. 634-645. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4393 , pp. 634-645
    • Bursuc, S.1    Comon-Lundh, H.2    Delaune, S.3
  • 19
    • 26444497860 scopus 로고    scopus 로고
    • Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
    • Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.