-
1
-
-
17644411480
-
Mobile values, new names, and secure communication
-
ACM, New York
-
ABADI, M. ANDFOURNET, C. 2001. Mobile values, new names, and secure communication. In Proceedings of the 28th ACM Symposium on Principles of Programming Languages (POPL01). ACM, New York, 104-115.
-
(2001)
Proceedings of the 28th ACM Symposium on Principles of Programming Languages (POPL01)
, pp. 104-115
-
-
ABADI, M.1
ANDFOURNET, C.2
-
2
-
-
28144458017
-
-
ALLAMIGEON, X. ANDBLANCHET, B. 2005. Reconstruction of attacks against cryptographic protocols. In Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW-18) (Aix-enProvence, France). IEEE Computer Society Press, Los Alamitos, CA, 140-154.
-
ALLAMIGEON, X. ANDBLANCHET, B. 2005. Reconstruction of attacks against cryptographic protocols. In Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW-18) (Aix-enProvence, France). IEEE Computer Society Press, Los Alamitos, CA, 140-154.
-
-
-
-
3
-
-
34249658491
-
Secure sessions for web services
-
May
-
BHAROAVAN, K., CORIN, R., FOURNET, C., ANDGORDON, A. D. 2006a. Secure sessions for web services. ACM Trans. Inform. Syst. Secu. (TISSEC) 10, 8 (May).
-
(2006)
ACM Trans. Inform. Syst. Secu. (TISSEC) 10
, pp. 8
-
-
BHAROAVAN, K.1
CORIN, R.2
FOURNET, C.3
ANDGORDON, A.D.4
-
4
-
-
18544363572
-
-
BHARGAVAN, K., FOURNET, C., ANDGORDON, A. D. 2005a. A semantics for web services authentication. Theor. Comput. Sci. 340, 1 (June), 102-153. (See also Microsoft Research Technical Report MSR-TR-2003-83).
-
BHARGAVAN, K., FOURNET, C., ANDGORDON, A. D. 2005a. A semantics for web services authentication. Theor. Comput. Sci. 340, 1 (June), 102-153. (See also Microsoft Research Technical Report MSR-TR-2003-83).
-
-
-
-
5
-
-
56349135315
-
-
BHARGAVAN, K., FOURNET, C., ANDG ORDON, A. D. 2005b. Verifying policy-based security for web services. Tech. Rep. MSR-TR-2004-84, Microsoft Research. Nov.
-
BHARGAVAN, K., FOURNET, C., ANDG ORDON, A. D. 2005b. Verifying policy-based security for web services. Tech. Rep. MSR-TR-2004-84, Microsoft Research. Nov.
-
-
-
-
6
-
-
34547330121
-
Policy advisor for WSE 3.0
-
Microsoft Press
-
BHARGAVAN, K., FOURNET, C., ANDGORDON, A. D. 2006b. Policy advisor for WSE 3.0. In Web Service Security: Scenarios, patterns, and implementation guidance for Web Services Enhancements (WSE) 3.0. Microsoft Press, 324-330.
-
(2006)
Web Service Security: Scenarios, patterns, and implementation guidance for Web Services Enhancements (WSE) 3.0
, pp. 324-330
-
-
BHARGAVAN, K.1
FOURNET, C.2
ANDGORDON, A.D.3
-
7
-
-
33845212195
-
Verified reference implementations of WS-Security protocols
-
Proceedings of the 3rd International Workshop on Web Services and Formal Methods WS-FM 2006, Springer-Verlag, New York
-
BHARGAVAN, K., FOURNET, C., ANDGORDON, A. D. 2006C. Verified reference implementations of WS-Security protocols. In Proceedings of the 3rd International Workshop on Web Services and Formal Methods (WS-FM 2006). Lecture Notes in Computer Science, vol. 4184. Springer-Verlag, New York, 88-106.
-
(2006)
Lecture Notes in Computer Science
, vol.4184
, pp. 88-106
-
-
BHARGAVAN, K.1
FOURNET, C.2
ANDGORDON, A.D.3
-
8
-
-
77954342153
-
An advisor for web services security policies
-
Tool download available from
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., ANDO'SHEA, G. 2005C. An advisor for web services security policies. In Proceedings of the 2005 ACM Workshop on Secure Web Services (SWS). 1-9. Tool download available from http://Securing.WS.
-
(2005)
Proceedings of the 2005 ACM Workshop on Secure Web Services (SWS)
, pp. 1-9
-
-
BHARGAVAN, K.1
FOURNET, C.2
GORDON, A.D.3
ANDO'SHEA, G.4
-
9
-
-
35048821943
-
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., ANDPUCELLA, R. 2004. TulaFale: A security tool for web services. In Proceedings of the International Symposium on Formal Methods for Components and Objects (FMCO'03). Lecture Notes in Computer Science, 3188. Springer-Verlag, New York, 197-222. Tool download available from http://Securing.WS.
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., ANDPUCELLA, R. 2004. TulaFale: A security tool for web services. In Proceedings of the International Symposium on Formal Methods for Components and Objects (FMCO'03). Lecture Notes in Computer Science, vol. 3188. Springer-Verlag, New York, 197-222. Tool download available from http://Securing.WS.
-
-
-
-
10
-
-
67649884132
-
Verified implementations of the Information Card federated identity-management protocol
-
ACM, New York
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., ANDSWAMY, N. 2008. Verified implementations of the Information Card federated identity-management protocol. In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS'08). ACM, New York, 123-135.
-
(2008)
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS'08)
, pp. 123-135
-
-
BHARGAVAN, K.1
FOURNET, C.2
GORDON, A.D.3
ANDSWAMY, N.4
-
11
-
-
33947683919
-
Verified interoperable implementations of security protocols
-
IEEE Computer Society Press, Los Alamitos, CA
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., ANDTSE, S. 2006d. Verified interoperable implementations of security protocols. In Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06). IEEE Computer Society Press, Los Alamitos, CA, 139-152.
-
(2006)
Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06)
, pp. 139-152
-
-
BHARGAVAN, K.1
FOURNET, C.2
GORDON, A.D.3
ANDTSE, S.4
-
12
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society Press, Los Alamitos, CA
-
BLANCHET, B. 2001. An efficient cryptographic protocol verifier based on Prolog rules. In Proceedings of the 14th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos, CA, 82-96.
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
BLANCHET, B.1
-
13
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
Proceedings of the 9th International Static Analysis Symposium, SAS'02, Springer-Verlag, New York
-
BLANCHET, B. 2002. From secrecy to authenticity in security protocols. In Proceedings of the 9th International Static Analysis Symposium, (SAS'02). Lecture Notes in Computer Science, vol. 2477. Springer-Verlag, New York, 342-359.
-
(2002)
Lecture Notes in Computer Science
, vol.2477
, pp. 342-359
-
-
BLANCHET, B.1
-
14
-
-
26844508455
-
Automated verification of selected equivalences for security protocols
-
Chicago, IL, IEEE Computer Society Press, Los Alamitos, CA
-
BLANCHET, B., ABADI, M., ANDFOURNET, C. 2005. Automated verification of selected equivalences for security protocols. In Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005) (Chicago, IL). IEEE Computer Society Press, Los Alamitos, CA, 331-340.
-
(2005)
Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005)
, pp. 331-340
-
-
BLANCHET, B.1
ABADI, M.2
ANDFOURNET, C.3
-
15
-
-
56349107805
-
-
BOX, D., CHRISTENSEN, E., CURBERA, F., FERGUSON, D., FREY, J., HADLEY, M., KALER, C., LANGWORTHY, D., LEYMANN, F., LOVERING, B., LUCCO, S., MILLET, S., MUKHI, N., NOTTINGHAM, M., ORCHARD, D., SHEWCHUK, J., SINDAMBIWE, E., STOREY, T., WEERAWARANA, S., ANDWINKLER, S. 2004. Web Services Addressing (WS-Addressing). W3C Submission.
-
BOX, D., CHRISTENSEN, E., CURBERA, F., FERGUSON, D., FREY, J., HADLEY, M., KALER, C., LANGWORTHY, D., LEYMANN, F., LOVERING, B., LUCCO, S., MILLET, S., MUKHI, N., NOTTINGHAM, M., ORCHARD, D., SHEWCHUK, J., SINDAMBIWE, E., STOREY, T., WEERAWARANA, S., ANDWINKLER, S. 2004. Web Services Addressing (WS-Addressing). W3C Submission.
-
-
-
-
16
-
-
4544279898
-
-
BOX, D., CURBERA, F., HONDO, M., KALER, C., LANGWORTHY, D., NADALIN, A., NAGARATNAM, N., NOTTINGHAM, M., VON RIEGEN, C., ANDSHEWCHUK, J. 2003a. Web services policy framework (WS-Policy).
-
(2003)
Web services policy framework (WS-Policy)
-
-
BOX, D.1
CURBERA, F.2
HONDO, M.3
KALER, C.4
LANGWORTHY, D.5
NADALIN, A.6
NAGARATNAM, N.7
NOTTINGHAM, M.8
VON RIEGEN, C.9
ANDSHEWCHUK, J.10
-
17
-
-
4544335903
-
-
WS-PolicyAssertions
-
BOX, D., HONDO, M., KALER, C., MARUYAMA, H., NADALIN, A., NAGARATNAM, N., PATRICK, P., VON RIEGEN, C., ANDSHEWCHUK, J. 2003b. Web services policy assertions language (WS-PolicyAssertions).
-
(2003)
Web services policy assertions language
-
-
BOX, D.1
HONDO, M.2
KALER, C.3
MARUYAMA, H.4
NADALIN, A.5
NAGARATNAM, N.6
PATRICK, P.7
VON RIEGEN, C.8
ANDSHEWCHUK, J.9
-
18
-
-
56349159517
-
-
DELLA-LIBERA, G, HALLAM-BAKER, P, HONDO, M, JANCZUK, T, KALER, C, MARUYAMA, H, NAGARATNAM, N, NASH, A, PHILPOTT, R, PRAFULLCHANDRA, H, SHEWCHUK, J, WAINGOLD, E, ANDZOLFONOON, R. 2002. Web services security policy language WS-SecurityPolicy, Version 1.0
-
DELLA-LIBERA, G., HALLAM-BAKER, P., HONDO, M., JANCZUK, T., KALER, C., MARUYAMA, H., NAGARATNAM, N., NASH, A., PHILPOTT, R., PRAFULLCHANDRA, H., SHEWCHUK, J., WAINGOLD, E., ANDZOLFONOON, R. 2002. Web services security policy language (WS-SecurityPolicy). Version 1.0.
-
-
-
-
19
-
-
56349129127
-
-
DIERKS, T. ANDRESCORLA, E. 2006. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346, Internet Engineering Task Force Proposed Standard
-
DIERKS, T. ANDRESCORLA, E. 2006. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346, Internet Engineering Task Force Proposed Standard.
-
-
-
-
20
-
-
0020720357
-
On the security of public key protocols
-
DOLEV, D. ANDYAO, A. 1983. On the security of public key protocols. IEEE Trans. Inform. Theory IT-29, 2, 198-208.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
DOLEV, D.1
ANDYAO, A.2
-
21
-
-
56349108022
-
-
EASTLAKE, D., REAGLE, J., IMAMURA, T., DILLAWAY, B., ANDSIMON, E. 2002a. XML Encryption Syntax and Processing. W3C Recommendation.
-
EASTLAKE, D., REAGLE, J., IMAMURA, T., DILLAWAY, B., ANDSIMON, E. 2002a. XML Encryption Syntax and Processing. W3C Recommendation.
-
-
-
-
22
-
-
56349146366
-
-
EASTLAKE, D., REAGLE, J., SOLO, D., BARTEL, M., BOYER, J., FOX, B., LAMACCHIA, B., ANDSIMON, E. 2002b. XML-Signature Syntax and Processing. W3C Recommendation.
-
EASTLAKE, D., REAGLE, J., SOLO, D., BARTEL, M., BOYER, J., FOX, B., LAMACCHIA, B., ANDSIMON, E. 2002b. XML-Signature Syntax and Processing. W3C Recommendation.
-
-
-
-
23
-
-
0141863341
-
Authenticity by typing for security protocols
-
GORDON, A. D. ANDJEFFREY, A. 2003. Authenticity by typing for security protocols. J. Comput. Secur. 11, 4, 451-521.
-
(2003)
J. Comput. Secur
, vol.11
, Issue.4
, pp. 451-521
-
-
GORDON, A.D.1
ANDJEFFREY, A.2
-
24
-
-
26844492006
-
Validating a web service security abstraction by typing
-
GORDON, A. D. ANDPUCELLA, R. 2005. Validating a web service security abstraction by typing. Formal Aspects of Comput. 17, 277-318.
-
(2005)
Formal Aspects of Comput
, vol.17
, pp. 277-318
-
-
GORDON, A.D.1
ANDPUCELLA, R.2
-
25
-
-
14844314179
-
Rigorous automated network security management
-
GUTTMAN, J. D. ANDHERZOG, A. L. 2005. Rigorous automated network security management. Int. J. Inform. Secur. 4, 1-2, 29-48.
-
(2005)
Int. J. Inform. Secur
, vol.4
, Issue.1-2
, pp. 29-48
-
-
GUTTMAN, J.D.1
ANDHERZOG, A.L.2
-
28
-
-
14844329713
-
-
MICROSOFT CORPORATION, Microsoft Corporation
-
MICROSOFT CORPORATION 2004. Web Services Enhancements (WSE) 2.0. Microsoft Corporation.
-
(2004)
Web Services Enhancements (WSE) 2.0
-
-
-
29
-
-
3042673595
-
Cryptographic protocol generation from CAPSL
-
Tech. Rep. SRICSL-01-07, SRI
-
MULLER, F. ANDMILLEN, J. 2001. Cryptographic protocol generation from CAPSL. Tech. Rep. SRICSL-01-07, SRI.
-
(2001)
-
-
MULLER, F.1
ANDMILLEN, J.2
-
30
-
-
33749051221
-
-
OASIS Standard
-
NADALIN, A., GRIFFIN, P., KALER, C., HALLAM-BAKER, P., ANDMONZILLO, R. 2004a. Web Services Security: UsernameToken Profile 1.0. OASIS Standard.
-
(2004)
Web Services Security: UsernameToken Profile 1.0
-
-
NADALIN, A.1
GRIFFIN, P.2
KALER, C.3
HALLAM-BAKER, P.4
ANDMONZILLO, R.5
-
31
-
-
21244462147
-
-
OASIS Standard
-
NADALIN, A., KALER, C., HALLAM-BAKER, P., ANDMONZILLO, R. 2004b. Web Services Security: SOAP Message Security 1.0 (WS-Security 2004). OASIS Standard.
-
(2004)
Web Services Security: SOAP Message Security 1.0 (WS-Security 2004)
-
-
NADALIN, A.1
KALER, C.2
HALLAM-BAKER, P.3
ANDMONZILLO, R.4
-
32
-
-
21244462147
-
-
OASIS Standard
-
NADALIN, A., KALER, C., HALLAM-BAKER, P., ANDMONZILLO, R. 2006. Web Services Security: SOAP Message Security 1.1 (WS-Security 2004). OASIS Standard.
-
(2006)
Web Services Security: SOAP Message Security 1.1 (WS-Security 2004)
-
-
NADALIN, A.1
KALER, C.2
HALLAM-BAKER, P.3
ANDMONZILLO, R.4
-
33
-
-
56349149885
-
-
OASIS Standard
-
NADALIN, A., GOODNER, M., GUDGIN, M., BARBIR, A., ANDGRANQVIST, H. 2007. WS-SecurityPolicy 1.2. OASIS Standard.
-
(2007)
WS-SecurityPolicy 1.2
-
-
NADALIN, A.1
GOODNER, M.2
GUDGIN, M.3
BARBIR, A.4
ANDGRANQVIST, H.5
-
34
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
NEEDHAM, R. ANDSCHROEDER, M. 1978. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12, 993-999.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
NEEDHAM, R.1
ANDSCHROEDER, M.2
-
35
-
-
84958777572
-
AGVI - Automatic generation, verification, and implementation of security protocols
-
Proceedings of the 13th Conference on Computer Aided Verification CAV, Springer-Verlag, New York
-
PERRIG, A., SONG, D., ANDPHAN, D. 2001. AGVI - Automatic generation, verification, and implementation of security protocols. In Proceedings of the 13th Conference on Computer Aided Verification (CAV). Lecture Notes in Computer Science. Springer-Verlag, New York, 241-245.
-
(2001)
Lecture Notes in Computer Science
, pp. 241-245
-
-
PERRIG, A.1
SONG, D.2
ANDPHAN, D.3
-
36
-
-
3042621964
-
Spi2Java: Automatic cryptographic protocol Java code generation from spi calculus
-
POZZA, D., SISTO, R., ANDDURANTE, L. 2004. Spi2Java: automatic cryptographic protocol Java code generation from spi calculus. In Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004). Vol. 1. 400-405.
-
(2004)
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004)
, vol.1
, pp. 400-405
-
-
POZZA, D.1
SISTO, R.2
ANDDURANTE, L.3
-
37
-
-
4744347868
-
-
TATSUBORI, M., IMAMURA, T., ANDN AKAMURA, Y. 2004. Best practice patterns and tool support for configuring secure web services messaging. In Proceedings of the International Conference on Web Services (ICWS'04). 244-251.
-
TATSUBORI, M., IMAMURA, T., ANDN AKAMURA, Y. 2004. Best practice patterns and tool support for configuring secure web services messaging. In Proceedings of the International Conference on Web Services (ICWS'04). 244-251.
-
-
-
-
38
-
-
56349091327
-
-
W3C. 1999. XML Path Language (XPath) Version 1.0. W3C. W3C Recommendation
-
W3C. 1999. XML Path Language (XPath) Version 1.0. W3C. W3C Recommendation.
-
-
-
-
39
-
-
56349084091
-
-
W3C. 2003. SOAP Version 1.2. W3C. W3C Recommendation
-
W3C. 2003. SOAP Version 1.2. W3C. W3C Recommendation.
-
-
-
-
40
-
-
0027205880
-
A semantic model for authentication protocols
-
IEEE Computer Society Press, Los Alamitos, CA
-
WOO, T. ANDLAM, S. 1993. A semantic model for authentication protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 178-194.
-
(1993)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 178-194
-
-
WOO, T.1
ANDLAM, S.2
-
41
-
-
0038825029
-
Using replication and partitioning to build secure distributed systems
-
IEEE Computer Society Press, Los Alamitos, CA
-
ZHENG, L., CHONG, S., MYERS, A. C., ANDZDANCEWIC, S. 2003. Using replication and partitioning to build secure distributed systems. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 236-250.
-
(2003)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 236-250
-
-
ZHENG, L.1
CHONG, S.2
MYERS, A.C.3
ANDZDANCEWIC, S.4
|