메뉴 건너뛰기




Volumn 6957 LNCS, Issue , 2011, Pages 1-22

ASLan++ - A formal security specification language for distributed systems

Author keywords

formal analysis; security; services; specification language

Indexed keywords

ABSTRACTION LEVEL; APPLICATION LEVEL; AUTHENTICATION MECHANISMS; COMMUNICATION SECURITY; DISTRIBUTED SYSTEMS; DYNAMIC ACCESS CONTROL; FORMAL ANALYSIS; FORMAL SECURITY; SECURITY; SECURITY GOALS; SECURITY POLICY; SECURITY PROPERTIES; SERVICE ORIENTED; SERVICES; SYSTEM DESIGNERS; WORK-FLOWS;

EID: 84255177327     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25271-6_1     Document Type: Conference Paper
Times cited : (24)

References (21)
  • 5
    • 84855534913 scopus 로고    scopus 로고
    • AVISPA Project, http://www.avispa-project.org
  • 8
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of CSFW 2001, pp. 82-96. IEEE Computer Society Press, Los Alamitos (2001) (Pubitemid 32877779)
    • (2001) Proceedings of the Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 11
    • 77957575144 scopus 로고    scopus 로고
    • Protocol composition for arbitrary primitives
    • Ciobâca, S., Cortier, V.: Protocol composition for arbitrary primitives. In: Proceedings of CSF, pp. 322-336 (2010)
    • (2010) Proceedings of CSF , pp. 322-336
    • Ciobâca, S.1    Cortier, V.2
  • 13
    • 48949088211 scopus 로고    scopus 로고
    • The scyther tool: Verification, falsification, and analysis of security protocols
    • Gupta, A., Malik, S. (eds.) LNCS Springer, Heidelberg
    • Cremers, C.: The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)
    • (2008) CAV 2008 , vol.5123 , pp. 414-418
    • Cremers, C.1
  • 16
    • 70349314888 scopus 로고    scopus 로고
    • Maude-npa: Cryptographic protocol analysis modulo equational properties
    • Escobar, S., Meadows, C., Meseguer, J.: Maude-npa: Cryptographic protocol analysis modulo equational properties. In: FOSAD, pp. 1-50 (2007)
    • (2007) FOSAD , pp. 1-50
    • Escobar, S.1    Meadows, C.2    Meseguer, J.3
  • 19
    • 78650030226 scopus 로고    scopus 로고
    • Abstraction by set-membership - Verifying security protocols and web services with databases
    • ACM Press, New York
    • Mödersheim, S.: Abstraction by Set-Membership - Verifying Security Protocols and Web Services with Databases. In: Proceedings of 17th CCS. ACM Press, New York (2010)
    • (2010) Proceedings of 17th CCS
    • Mödersheim, S.1
  • 20
    • 70349335930 scopus 로고    scopus 로고
    • The open-source fixed-point model checker for symbolic analysis of security protocols
    • Aldini, A., Barthe, G., Gorrieri, R. (eds.) LNCS Springer, Heidelberg
    • Mödersheim, S., Viganò, L.: The Open-source Fixed-point Model Checker for Symbolic Analysis of Security Protocols. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) Fosad 2007-2008-2009. LNCS, vol. 5705, pp. 166-194. Springer, Heidelberg (2009)
    • (2009) Fosad 2007-2008-2009 , vol.5705 , pp. 166-194
    • Mödersheim, S.1    Viganò, L.2
  • 21
    • 0034822801 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions is NP-complete
    • IEEE Computer Society, Los Alamitos
    • Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions is NP-complete. In: CSFW, p. 174. IEEE Computer Society, Los Alamitos (2001)
    • (2001) CSFW , pp. 174
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.