메뉴 건너뛰기




Volumn 206, Issue 2-4, 2008, Pages 291-311

On the relationships between models in protocol verification

Author keywords

Abstraction; Formal verification; Security protocols

Indexed keywords

ABSTRACTING; APPROXIMATION THEORY; AUTHENTICATION; MATHEMATICAL MODELS; VERIFICATION;

EID: 40149098057     PISSN: 08905401     EISSN: 10902651     Source Type: Journal    
DOI: 10.1016/j.ic.2007.07.006     Document Type: Article
Times cited : (3)

References (30)
  • 1
    • 26444497860 scopus 로고    scopus 로고
    • A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Héam, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, L. Vigneron, The AVISPA tool for the automated validation of internet security protocols and applications, in: CAV'05, 2005, pp. 281-285.
    • A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Héam, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, L. Vigneron, The AVISPA tool for the automated validation of internet security protocols and applications, in: CAV'05, 2005, pp. 281-285.
  • 2
    • 40149097491 scopus 로고    scopus 로고
    • G. Denker, J. Millen, CAPSL intermediate language, in: Formal Methods and Security Protocols, 1999, pp. 1-10.
    • G. Denker, J. Millen, CAPSL intermediate language, in: Formal Methods and Security Protocols, 1999, pp. 1-10.
  • 3
    • 34047234972 scopus 로고    scopus 로고
    • Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
    • Meseguer J., and Thati P. Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Journal of Higher-Order and Symbolic Computation 20 1-2 (2005) 123-160
    • (2005) Journal of Higher-Order and Symbolic Computation , vol.20 , Issue.1-2 , pp. 123-160
    • Meseguer, J.1    Thati, P.2
  • 4
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L.C. The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6 1 (1998) 85-128
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.C.1
  • 5
    • 35248852076 scopus 로고    scopus 로고
    • A comparison between strand spaces and multiset rewriting for security protocol analysis
    • Proceedings of ISSS 2002, Springer-Verlag
    • Cervesato I., Durgin N., Lincoln P.D., Mitchell J.C., and Scedrov A. A comparison between strand spaces and multiset rewriting for security protocol analysis. Proceedings of ISSS 2002. LNCS 2609 (2003), Springer-Verlag 356-383
    • (2003) LNCS 2609 , pp. 356-383
    • Cervesato, I.1    Durgin, N.2    Lincoln, P.D.3    Mitchell, J.C.4    Scedrov, A.5
  • 6
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • Abadi M., and Blanchet B. Analyzing security protocols with secrecy types and logic programs. Journal of the ACM 52 1 (2005) 102-146
    • (2005) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 7
    • 35248860689 scopus 로고    scopus 로고
    • Security properties: two agents are sufficient
    • Proceedings of ESOP'2003, Springer-Verlag
    • Cortier V. Security properties: two agents are sufficient. Proceedings of ESOP'2003. LNCS 2618 (2003), Springer-Verlag 99-113
    • (2003) LNCS 2618 , pp. 99-113
    • Cortier, V.1
  • 8
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Computer Society Press
    • Blanchet B. An efficient cryptographic protocol verifier based on prolog rules. CSFW'01 (2001), IEEE Computer Society Press 82-96
    • (2001) CSFW'01 , pp. 82-96
    • Blanchet, B.1
  • 9
    • 40149084533 scopus 로고    scopus 로고
    • Y. Boichut, P.-C. Héam, O. Kouchnarenko, F. Oehl, Improvements on the Genet and Klay technique to automatically verify security protocols, in: Automated Verification of Infinite-State Systems (AVIS'04), 2004, pp. 1-11.
    • Y. Boichut, P.-C. Héam, O. Kouchnarenko, F. Oehl, Improvements on the Genet and Klay technique to automatically verify security protocols, in: Automated Verification of Infinite-State Systems (AVIS'04), 2004, pp. 1-11.
  • 11
    • 84944038631 scopus 로고    scopus 로고
    • Automating data independence
    • Esorics 2000, Springer-Verlag
    • Broadfoot P., Lowe G., and Roscoe A. Automating data independence. Esorics 2000. LNCS 1895 (2000), Springer-Verlag 175-190
    • (2000) LNCS 1895 , pp. 175-190
    • Broadfoot, P.1    Lowe, G.2    Roscoe, A.3
  • 12
    • 84937559950 scopus 로고    scopus 로고
    • Y. Chevalier, L. Vigneron, Automated unbounded verification of security protocols, in: CAV'02, LNCS 2404, 2002, pp. 324-337.
    • Y. Chevalier, L. Vigneron, Automated unbounded verification of security protocols, in: CAV'02, LNCS 2404, 2002, pp. 324-337.
  • 13
    • 84937389998 scopus 로고    scopus 로고
    • Rewriting for cryptographic protocol verification
    • CADE'00, Springer-Verlag
    • Genet T., and Klay F. Rewriting for cryptographic protocol verification. CADE'00. LNCS 1831 (2000), Springer-Verlag 271-290
    • (2000) LNCS 1831 , pp. 271-290
    • Genet, T.1    Klay, F.2
  • 14
    • 40149103328 scopus 로고    scopus 로고
    • C. Weidenbach, Towards an automatic analysis of security protocols, in: CADE'99, LNCS 1632, Berlin, 1999, pp. 378-382.
    • C. Weidenbach, Towards an automatic analysis of security protocols, in: CADE'99, LNCS 1632, Berlin, 1999, pp. 378-382.
  • 15
    • 22344454117 scopus 로고    scopus 로고
    • Security protocols: from linear to classical logic by abstract interpretation
    • Blanchet B. Security protocols: from linear to classical logic by abstract interpretation. Information Processing Letters 95 5 (2005) 473-479
    • (2005) Information Processing Letters , vol.95 , Issue.5 , pp. 473-479
    • Blanchet, B.1
  • 16
    • 33646265822 scopus 로고    scopus 로고
    • Automatic approximation for the verification of cryptographic protocols
    • Formal Aspects of Security (FASec'02), Springer-Verlag
    • Oehl F., Gécé G., Kouchnarenko O., and Sinclair D. Automatic approximation for the verification of cryptographic protocols. Formal Aspects of Security (FASec'02). LNCS 2629 (2002), Springer-Verlag 33-48
    • (2002) LNCS 2629 , pp. 33-48
    • Oehl, F.1    Gécé, G.2    Kouchnarenko, O.3    Sinclair, D.4
  • 19
    • 77956968984 scopus 로고    scopus 로고
    • P. Aczel, An introduction to inductive definitions, in: Handbook of Mathematical Logic, 1977, pp. 739-782.
    • P. Aczel, An introduction to inductive definitions, in: Handbook of Mathematical Logic, 1977, pp. 739-782.
  • 21
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • ACM Press
    • Millen J.K., and Shmatikov V. Constraint solving for bounded-process cryptographic protocol analysis. CCS'01 (2001), ACM Press 166-175
    • (2001) CCS'01 , pp. 166-175
    • Millen, J.K.1    Shmatikov, V.2
  • 22
    • 0030708255 scopus 로고    scopus 로고
    • G. Lowe, A hierarchy of authentication specifications, in: CSFW'97, 1997, pp. 31-43.
    • G. Lowe, A hierarchy of authentication specifications, in: CSFW'97, 1997, pp. 31-43.
  • 23
    • 0031650188 scopus 로고    scopus 로고
    • N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, 1998, pp. 86-99.
    • N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, 1998, pp. 86-99.
  • 24
    • 40149112349 scopus 로고    scopus 로고
    • P. Hankes Drielsma, S. Mödersheim, The ASW protocol revisited: a unified view, in: ARSPA 2004, 2005, pp. 141-156.
    • P. Hankes Drielsma, S. Mödersheim, The ASW protocol revisited: a unified view, in: ARSPA 2004, 2005, pp. 141-156.
  • 26
    • 0033683607 scopus 로고    scopus 로고
    • J. Heather, S. Schneider, Towards automatic verification of authentication protocols on an unbounded network, in: CSFW 2000, 2000, pp. 132-143.
    • J. Heather, S. Schneider, Towards automatic verification of authentication protocols on an unbounded network, in: CSFW 2000, 2000, pp. 132-143.
  • 27
    • 33750487822 scopus 로고    scopus 로고
    • Injective synchronisation: an extension of the authentication hierarchy
    • Cremers C.J.F., Mauw S., and de Vink E.P. Injective synchronisation: an extension of the authentication hierarchy. Theoretical Computer Science 367 1 (2006) 139-161
    • (2006) Theoretical Computer Science , vol.367 , Issue.1 , pp. 139-161
    • Cremers, C.J.F.1    Mauw, S.2    de Vink, E.P.3
  • 28
    • 0001937830 scopus 로고    scopus 로고
    • A formal language for cryptographic protocol requirements
    • Special issue of Designs
    • Syverson P., and Meadows C. A formal language for cryptographic protocol requirements. Special issue of Designs. Codes and Cryptography 7 1-2 (1996) 27-59
    • (1996) Codes and Cryptography , vol.7 , Issue.1-2 , pp. 27-59
    • Syverson, P.1    Meadows, C.2
  • 29
    • 0002508587 scopus 로고    scopus 로고
    • A lesson on authenticated protocol design
    • Woo T., and Lam S. A lesson on authenticated protocol design. Operating Systems Review 28 (1997) 24-37
    • (1997) Operating Systems Review , vol.28 , pp. 24-37
    • Woo, T.1    Lam, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.