메뉴 건너뛰기




Volumn , Issue , 2008, Pages 33-40

Security protocols, properties, and their monitoring

Author keywords

Language based security; Monitoring history based properties; Runtime verification; Security automata; Security protocols; Temporal logic

Indexed keywords

CORRECTNESS PROPERTIES; LANGUAGE-BASED SECURITY; MONITORING FRAMEWORKS; PRIOR ARTS; PROTOCOL IMPLEMENTATIONS; PROTOCOL SPECIFICATIONS; RUNTIME VERIFICATION; RUNTIME VERIFICATIONS; SAFETY PROPERTIES; SECURITY AUTOMATA; SECURITY PROTOCOLS; SECURITY REQUIREMENTS;

EID: 57049172592     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1370905.1370910     Document Type: Conference Paper
Times cited : (11)

References (28)
  • 1
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • Jan
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, Jan. 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 3
    • 34547286095 scopus 로고
    • Defining liveness
    • Technical report, Ithaca, NY, USA
    • B. Alpern and F. B. Schneider. Defining liveness. Technical report, Ithaca, NY, USA, 1984.
    • (1984)
    • Alpern, B.1    Schneider, F.B.2
  • 4
    • 0023558367 scopus 로고
    • Recognizing safety and liveness
    • B. Alpern and F B. Schneider. Recognizing safety and liveness. Distributed Computing, 2(3): 117-126, 1987.
    • (1987) Distributed Computing , vol.2 , Issue.3 , pp. 117-126
    • Alpern, B.1    Schneider, F.B.2
  • 5
    • 85016422463 scopus 로고    scopus 로고
    • Monitoring of real-time properties
    • FSTTCS, of, Springer-Verlag, Dec
    • A. Bauer, M. Leucker, and C. Schallhart. Monitoring of real-time properties. In FSTTCS, volume 4337 of LNCS. Springer-Verlag, Dec. 2006.
    • (2006) LNCS , vol.4337
    • Bauer, A.1    Leucker, M.2    Schallhart, C.3
  • 6
    • 56749083145 scopus 로고    scopus 로고
    • Runtime verification for LTL and TLTL
    • Technical Report TUM-I0724, Institut für Informatik, Technische Universität München, Dec
    • A. Bauer, M. Leucker, and C. Schallhart. Runtime verification for LTL and TLTL. Technical Report TUM-I0724, Institut für Informatik, Technische Universität München, Dec. 2007.
    • (2007)
    • Bauer, A.1    Leucker, M.2    Schallhart, C.3
  • 10
    • 35248878834 scopus 로고    scopus 로고
    • C. Eisner, D. Fisman, J. Havlicek, Y. Lustig, A. McIsaac, and D. V. Campenhout. Reasoning with temporal logic on truncated paths. In W. A. H. Jr. and F. Somenzi, editors, CAV, 2725 of LNCS, pages 27-39. Springer-Verlag, 2003.
    • C. Eisner, D. Fisman, J. Havlicek, Y. Lustig, A. McIsaac, and D. V. Campenhout. Reasoning with temporal logic on truncated paths. In W. A. H. Jr. and F. Somenzi, editors, CAV, volume 2725 of LNCS, pages 27-39. Springer-Verlag, 2003.
  • 11
    • 84894622420 scopus 로고    scopus 로고
    • K. Etessami. Stutter-invariant languages, omega-automata, and temporal logic. In CAV, 1633 of LNCS, pages 236-248. Springer-Verlag, 1999.
    • K. Etessami. Stutter-invariant languages, omega-automata, and temporal logic. In CAV, volume 1633 of LNCS, pages 236-248. Springer-Verlag, 1999.
  • 13
    • 11344253696 scopus 로고    scopus 로고
    • On the construction of monitors for temporal logic properties
    • M. Geilen. On the construction of monitors for temporal logic properties. ENTCS, 55(2), 2001.
    • (2001) ENTCS , vol.55 , Issue.2
    • Geilen, M.1
  • 17
    • 33244457785 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • J. Jürjens. Sound methods and effective tools for model-based security engineering with UML. In ICSE, 2005.
    • (2005) ICSE
    • Jürjens, J.1
  • 18
    • 57049136634 scopus 로고    scopus 로고
    • Model-based run-time checking of security permissions using guarded objects
    • Run-time Verification
    • J. Jürjens. Model-based run-time checking of security permissions using guarded objects. In Run-time Verification, Lecture Notes in Computer Science, 2008.
    • (2008) Lecture Notes in Computer Science
    • Jürjens, J.1
  • 19
    • 33745725093 scopus 로고    scopus 로고
    • K. Krukow, M. Nielsen, and V. Sassone. A framework for concrete reputation-systems with applications to history-based access control. In CCS, pages 260-269. ACM, 2005.
    • K. Krukow, M. Nielsen, and V. Sassone. A framework for concrete reputation-systems with applications to history-based access control. In CCS, pages 260-269. ACM, 2005.
  • 20
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • L. Lamport. Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering, 3(2): 125-143, 1977.
    • (1977) IEEE Transactions on Software Engineering , vol.3 , Issue.2 , pp. 125-143
    • Lamport, L.1
  • 21
    • 85047040703 scopus 로고
    • The temporal logic of programs
    • IEEE
    • A. Pnueli. The temporal logic of programs. In FOCS, pages 46-57. IEEE, 1977.
    • (1977) FOCS , pp. 46-57
    • Pnueli, A.1
  • 22
    • 33749421226 scopus 로고    scopus 로고
    • A. Pnueli and A. Zaks. PSL model checking and run-time verification via testers. In FM, 4085 of LNCS, pages 573-586. Springer, 2006.
    • A. Pnueli and A. Zaks. PSL model checking and run-time verification via testers. In FM, volume 4085 of LNCS, pages 573-586. Springer, 2006.
  • 24
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • F. B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 26
    • 0002836659 scopus 로고    scopus 로고
    • A. P. Sistla. Safety, liveness and fairness in temporal logic. Formal Asp. Comput., 6(5):495-512, 1994.
    • A. P. Sistla. Safety, liveness and fairness in temporal logic. Formal Asp. Comput., 6(5):495-512, 1994.
  • 27
    • 35248860217 scopus 로고    scopus 로고
    • G. Spanoudakis, C. Kloukinas, and K. Androutsopoulos. Towards security monitoring patterns. In SAC, pages 1518-1525. ACM, 2007.
    • G. Spanoudakis, C. Kloukinas, and K. Androutsopoulos. Towards security monitoring patterns. In SAC, pages 1518-1525. ACM, 2007.
  • 28
    • 57049170141 scopus 로고    scopus 로고
    • Umlsec tool, 2001-08. http://computing-research.open.ac.uk/jj/umlsectool.
    • Umlsec tool, 2001-08. http://computing-research.open.ac.uk/jj/umlsectool.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.