-
1
-
-
26444497860
-
The AVISPA Tool for the Automated Validation of Internet Security Protocolsand Applications
-
Springer-Verlag, Available at
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Heám, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganó, and L. Vigneron. The AVISPA Tool for the Automated Validation of Internet Security Protocolsand Applications. In Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05). Springer-Verlag, 2005. Available at www.avispa-project.org.
-
(2005)
Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05)
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Hankes Drielsma, P.7
Heám, P.-C.8
Mantovani, J.9
Mödersheim, S.10
von Oheimb, D.11
Rusinowitch, M.12
Santiago, J.13
Turuani, M.14
Viganó, L.15
Vigneron, L.16
-
4
-
-
67649884132
-
Verified implementations of the information card federated identity-management protocol
-
K. Bhargavan, C. Fournet, A. D. Gordon, and N. Swamy. Verified implementations of the information card federated identity-management protocol. In ASIACCS, pages 123-135, 2008.
-
(2008)
ASIACCS
, pp. 123-135
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Swamy, N.4
-
5
-
-
84958749546
-
-
B. Blanchet. From secrecy to authenticity in security protocols. In In 9th International Static Analysis Symposium (SAS'02), pages 342-359. Springer, 2002.
-
B. Blanchet. From secrecy to authenticity in security protocols. In In 9th International Static Analysis Symposium (SAS'02), pages 342-359. Springer, 2002.
-
-
-
-
9
-
-
33646034935
-
-
T. Groß, B. Pfitzmann, and A.-R. Sadeghi. Browser model for security analysis of browser-based protocols. In S. D. C. di Vimercati, P. F. Syverson, and D. Gollmann, editors, ESORICS, 3679 of Lecture Notes in Computer Science, pages 489-508. Springer, 2005.
-
T. Groß, B. Pfitzmann, and A.-R. Sadeghi. Browser model for security analysis of browser-based protocols. In S. D. C. di Vimercati, P. F. Syverson, and D. Gollmann, editors, ESORICS, volume 3679 of Lecture Notes in Computer Science, pages 489-508. Springer, 2005.
-
-
-
-
10
-
-
23144437178
-
Using static analysis to validate the SAML single sign-on protocol
-
New York, NY, USA, ACM Press
-
S. M. Hansen, J. Skriver, and H. R. Nielson. Using static analysis to validate the SAML single sign-on protocol. In WITS '05: Proceedings of the 2005 workshop on Issues in the theory of security, pages 27-40, New York, NY, USA, 2005. ACM Press.
-
(2005)
WITS '05: Proceedings of the 2005 workshop on Issues in the theory of security
, pp. 27-40
-
-
Hansen, S.M.1
Skriver, J.2
Nielson, H.R.3
-
11
-
-
70349242603
-
-
Available at, 2007
-
Internet2. Shibboleth Project. Available at http://shibboleth.internet2. edu/, 2007.
-
Internet2. Shibboleth Project
-
-
-
13
-
-
70349253465
-
-
Liberty Alliance Project. Available at .php
-
OASIS. Identity Federation. Liberty Alliance Project. Available at http://www.projectliberty.org/resources/specifications.php, 2004.
-
(2004)
Identity Federation
-
-
-
15
-
-
84897430504
-
-
Available at, April 2005
-
OASIS. Security Assertion Markup Language (SAML) v2.0. Available at http://www.oasis-open.org/committees/tc-home.php?wg-abbrev=security, April 2005.
-
Security Assertion Markup Language (SAML) v2.0
-
-
-
16
-
-
1142301938
-
Analysis of Liberty Single-Sign-on with Enabled Clients
-
B. Pfitzmann and M. Waidner. Analysis of Liberty Single-Sign-on with Enabled Clients. IEEE Internet Computing, 7(6):38-44, 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.6
, pp. 38-44
-
-
Pfitzmann, B.1
Waidner, M.2
-
17
-
-
33645654854
-
Federated identity-management protocols
-
B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols Workshop, of, Springer
-
B. Pfitzmann and M. Waidner. Federated identity-management protocols. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols Workshop, volume 3364 of Lecture Notes in Computer Science, pages 153-174. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.3364
, pp. 153-174
-
-
Pfitzmann, B.1
Waidner, M.2
|