메뉴 건너뛰기




Volumn 31, Issue 1, 2008, Pages

Verified interoperable implementations of security protocols

Author keywords

Functional programming; Pi calculus; Web services; XML security

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER PROGRAMMING; CONCRETE TESTING; CRYPTOGRAPHY; FUNCTIONAL PROGRAMMING; FUNCTIONS; INTEROPERABILITY; MARKUP LANGUAGES; NETWORK ARCHITECTURE; SECURITY OF DATA; WEB SERVICES; WORLD WIDE WEB; XML;

EID: 57849126802     PISSN: 01640925     EISSN: 15584593     Source Type: Journal    
DOI: 10.1145/1452044.1452049     Document Type: Article
Times cited : (51)

References (55)
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • ABADI, M. AND GORDON, A. D. 1999. A calculus for cryptographic protocols: The spi calculus. Inform. Comput. 148, 1-70.
    • (1999) Inform. Comput , vol.148 , pp. 1-70
    • ABADI, M.1    AND GORDON, A.D.2
  • 3
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • ABADI, M. AND ROGAWAY, P. 2002. Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptol. 15, 2, 103-127.
    • (2002) J. Cryptol , vol.15 , Issue.2 , pp. 103-127
    • ABADI, M.1    AND ROGAWAY, P.2
  • 5
    • 33845204881 scopus 로고    scopus 로고
    • Apache Software Foundation
    • Apache Software Foundation 2006. Apache WSS4J. Apache Software Foundation. http://ws.apache.org/ws s4j/.
    • (2006) Apache WSS4J
  • 6
    • 33646080360 scopus 로고    scopus 로고
    • Security-typed languages for implementation of cryptographic protocols: A case study
    • Proceedings of the 10th European Symposium on Research in Computer Security ESORICS'05, Springer
    • ASKAROV, A. AND SABELFELD, A. 2005. Security-typed languages for implementation of cryptographic protocols: A case study. In Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS'05). Lecture Notes in Computer Science, vol. 3679. Springer, 197-221.
    • (2005) Lecture Notes in Computer Science , vol.3679 , pp. 197-221
    • ASKAROV, A.1    AND SABELFELD, A.2
  • 9
    • 34249658491 scopus 로고    scopus 로고
    • ACM Trans. Inform. Syst. Secur. 10
    • 2, Article 8
    • BHARGAVAN, K., CORIN, R., FOURNET, C., AND GORDON, A. D. 2007c. Secure sessions for Web services. ACM Trans. Inform. Syst. Secur. 10, 2, Article 8.
    • (2007)
    • BHARGAVAN, K.1    CORIN, R.2    FOURNET, C.3    AND GORDON, A.D.4
  • 12
  • 13
    • 33845212195 scopus 로고    scopus 로고
    • Verified reference implementations of WS-Security protocols
    • Proceedings of the 3rd International Workshop on Web Services and Formal Methods WS-FM 2006, Springer
    • BHARGAVAN, K., FOURNET, C., AND GORDON, A. D. 2006b. Verified reference implementations of WS-Security protocols. In Proceedings of the 3rd International Workshop on Web Services and Formal Methods (WS-FM 2006). Lecture Notes in Computer Science, vol. 4184. Springer, 88-106.
    • (2006) Lecture Notes in Computer Science , vol.4184 , pp. 88-106
    • BHARGAVAN, K.1    FOURNET, C.2    AND GORDON, A.D.3
  • 14
    • 35048821943 scopus 로고    scopus 로고
    • TulaFale: A security tool for Web services
    • Proceedings of the International Symposium on Formal Methods for Components and. Objects FMCO'03, Springer
    • BHARGAVAN, K., FOURNET, C., GORDON, A. D., AND PUCELLA, R. 2004a. TulaFale: A security tool for Web services. In Proceedings of the International Symposium on Formal Methods for Components and. Objects (FMCO'03). Lecture Notes in Computer Science, vol. 3188. Springer, 197-222.
    • (2004) Lecture Notes in Computer Science , vol.3188 , pp. 197-222
    • BHARGAVAN, K.1    FOURNET, C.2    GORDON, A.D.3    AND PUCELLA, R.4
  • 18
    • 33947663592 scopus 로고    scopus 로고
    • Verified interoperable implementations of security protocols
    • Tech. rep. MSR-TR-2006-46, Microsoft Research
    • BHARGAVAN, K., FOURNET, C., GORDON, A. D., AND TSE, S. 2007b. Verified interoperable implementations of security protocols. Tech. rep. MSR-TR-2006-46, Microsoft Research.
    • (2007)
    • BHARGAVAN, K.1    FOURNET, C.2    GORDON, A.D.3    AND TSE, S.4
  • 22
    • 13644264990 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • BLANCHET, B. AND PODELSKI, A. 2005. Verification of cryptographic protocols: Tagging enforces termination. Theor. Comput. Sci. 333, 1-2, 67-90.
    • (2005) Theor. Comput. Sci , vol.333 , Issue.1-2 , pp. 67-90
    • BLANCHET, B.1    AND PODELSKI, A.2
  • 24
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • DOLEV, D. AND YAO, A. 1983. On the security of public key protocols. IEEE Trans. Inform. Theor. IT-29, 2, 198-208.
    • (1983) IEEE Trans. Inform. Theor , vol.IT-29 , Issue.2 , pp. 198-208
    • DOLEV, D.1    AND YAO, A.2
  • 27
    • 14644429758 scopus 로고    scopus 로고
    • A hierarchy of equivalences for asynchronous calculi
    • FOURNET, C. AND GONTHIER, G. 2005. A hierarchy of equivalences for asynchronous calculi. J. Logic Algeb. Program. 63, 131-173.
    • (2005) J. Logic Algeb. Program , vol.63 , pp. 131-173
    • FOURNET, C.1    AND GONTHIER, G.2
  • 29
    • 1442286773 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • GIAMBIAGI, P. AND DAM, M. 2004. On the secure implementation of security protocols. Sci. Comput. Program. 50, 73-99.
    • (2004) Sci. Comput. Program , vol.50 , pp. 73-99
    • GIAMBIAGI, P.1    AND DAM, M.2
  • 31
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real C code
    • Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation VMCAI'05, Springer
    • GOUBAULT-LARRECQ, J. AND PARRENNES, F. 2005. Cryptographic protocol analysis on real C code. In Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05). Lecture Notes in Computer Science, vol. 3385. Springer, 363-379.
    • (2005) Lecture Notes in Computer Science , vol.3385 , pp. 363-379
    • GOUBAULT-LARRECQ, J.1    AND PARRENNES, F.2
  • 32
    • 33646176467 scopus 로고    scopus 로고
    • Programming cryptographic protocols
    • Proceedings of the Conference Trusted. Global Computing TGC'05, Springer
    • GUTTMAN, J. D., HERZOG, J. C, RAMSDELL, J. D., AND SNIFFEN, B. T. 2005. Programming cryptographic protocols. In Proceedings of the Conference Trusted. Global Computing (TGC'05). Lecture Notes in Computer Science, vol. 3705. Springer, 116-145.
    • (2005) Lecture Notes in Computer Science , vol.3705 , pp. 116-145
    • GUTTMAN, J.D.1    HERZOG, J.C.2    RAMSDELL, J.D.3    AND SNIFFEN, B.T.4
  • 33
    • 33845196010 scopus 로고    scopus 로고
    • IBM CORPORATION
    • IBM CORPORATION. 2006. IBM WebSphere Application Server. IBM Corporation. http://www.ibm.com/software/websphere/.
    • (2006) IBM WebSphere Application Server
  • 37
    • 85026563474 scopus 로고    scopus 로고
    • On asynchrony in name-passing calculi
    • Proceedings of the Conference Automata, Languages and Programming ICALP'98, Springer
    • MERRO, M. AND SANGIORGI, D. 1998. On asynchrony in name-passing calculi. In Proceedings of the Conference Automata, Languages and Programming (ICALP'98). Lecture Notes in Computer Science, vol. 1443. Springer, 856-867.
    • (1998) Lecture Notes in Computer Science , vol.1443 , pp. 856-867
    • MERRO, M.1    AND SANGIORGI, D.2
  • 38
    • 14844329713 scopus 로고    scopus 로고
    • MICROSOFT CORPORATION
    • MICROSOFT CORPORATION. 2004. Web Services Enhancements (WSE) 2.0. Microsoft Corporation. http://msdn.microsoft.com/ webservices/building/wse/default.aspx.
    • (2004) Web Services Enhancements (WSE) 2.0
  • 39
    • 57849131522 scopus 로고    scopus 로고
    • MICROSOFT CORPORATION. 2005. F#. Microsoft Corporation. http://research.microsoft.com/fsharp/.
    • MICROSOFT CORPORATION. 2005. F#. Microsoft Corporation. http://research.microsoft.com/fsharp/.
  • 40
    • 77749259716 scopus 로고    scopus 로고
    • MICROSOFT CORPORATION
    • MICROSOFT CORPORATION. 2006. Windows Communication Foundation (WCF). Microsoft Corporation. http://wcf.netfx3.com/.
    • (2006) Windows Communication Foundation (WCF)
  • 41
    • 57849093413 scopus 로고    scopus 로고
    • MICROSOFT CORPORATION
    • MICROSOFT CORPORATION. 2007. FS2PV: A Cryptographic-Protocol Verifier for F#. Microsoft Corporation. http://research.microsoft.com/projects/samoa/.
    • (2007) FS2PV: A Cryptographic-Protocol Verifier for F
  • 42
    • 84976193394 scopus 로고
    • Functions as processes
    • MILNER, R. 1992. Functions as processes. Math. Struct. Comput. Sci. 2, 2, 119-141.
    • (1992) Math. Struct. Comput. Sci , vol.2 , Issue.2 , pp. 119-141
    • MILNER, R.1
  • 44
    • 3042673595 scopus 로고    scopus 로고
    • Cryptographic protocol generation from CAPSL
    • Tech. rep. SRI-CSL-01-07, SRI
    • MULLER, F. AND MILLEN, J. 2001. Cryptographic protocol generation from CAPSL. Tech. rep. SRI-CSL-01-07, SRI.
    • (2001)
    • MULLER, F.1    AND MILLEN, J.2
  • 45
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • NEEDHAM, R. AND SCHROEDER, M. 1978. Using encryption for authentication in large networks of computers. Comm. ACM 21, 12, 993-999.
    • (1978) Comm. ACM , vol.21 , Issue.12 , pp. 993-999
    • NEEDHAM, R.1    AND SCHROEDER, M.2
  • 47
    • 57849162675 scopus 로고    scopus 로고
    • Elyjah: A security analyzer for Java implementations of communications protocols
    • project report, Computer Science, Division of Informatics, University of Edinburgh
    • O'SHEA, N. 2006. Elyjah: A security analyzer for Java implementations of communications protocols. Fourth year project report, Computer Science, Division of Informatics, University of Edinburgh.
    • (2006) Fourth year
    • O'SHEA, N.1
  • 48
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • OTWAY, D. AND REES, O. 1987. Efficient and timely mutual authentication. Oper. Syst. Rev. 21, 1, 8-10.
    • (1987) Oper. Syst. Rev , vol.21 , Issue.1 , pp. 8-10
    • OTWAY, D.1    AND REES, O.2
  • 49
    • 84958777572 scopus 로고    scopus 로고
    • AGVI - automatic generation, verification, and implementation of security protocols
    • Proceedings of the 13th Conference on Computer Aided Verification CAV
    • PERRIG, A., SONG, D., AND PHAN, D. 2001. AGVI - automatic generation, verification, and implementation of security protocols. In Proceedings of the 13th Conference on Computer Aided Verification (CAV). Lecture Notes in Computer Science. Springer, 241-245.
    • (2001) Lecture Notes in Computer Science. Springer , vol.241-245
    • PERRIG, A.1    SONG, D.2    AND PHAN, D.3
  • 53
    • 57849134055 scopus 로고    scopus 로고
    • W3C 2003. SOAP Version 1.2. W3C. W3C Recommendation
    • W3C 2003. SOAP Version 1.2. W3C. W3C Recommendation.
  • 54
    • 57849169264 scopus 로고    scopus 로고
    • W3C 2004. Web Services Addressing (WS-Addressing). W3C. W3C Member Submission.
    • W3C 2004. Web Services Addressing (WS-Addressing). W3C. W3C Member Submission.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.