-
1
-
-
85006614284
-
Verifying security protocols as planning in logic programming.
-
Aiello, L., and Massacci, F. 2001. Verifying security protocols as planning in logic programming. ACM Transactions on Computational Logic 2(4):542-580.
-
(2001)
ACM Transactions on Computational Logic
, vol.2
, Issue.4
, pp. 542-580
-
-
Aiello, L.1
Massacci, F.2
-
2
-
-
84888355984
-
-
In Alferes, J., and Leite, J., eds., JELIA'04 of LNAI
-
Armando, A.; Compagna, L.; and Lierler, Y. 2004. Automatic compilation of protocol insecurity problems into logic programming. In Alferes, J., and Leite, J., eds., JELIA'04, volume 3239 of LNAI, 617-627.
-
(2004)
Automatic Compilation of Protocol Insecurity Problems into Logic Programming
, vol.3239
, pp. 617-627
-
-
Armando, A.1
Compagna, L.2
Lierler, Y.3
-
3
-
-
85025425124
-
CAPSL interface for the NRL protocol analyzer
-
IEEE Computer Society Press.
-
Brackin, S.; Meadows, C.; and Millen, J. 1999. CAPSL interface for the NRL protocol analyzer. In Proceedings of ASSET 99. IEEE Computer Society Press.
-
(1999)
Proceedings of ASSET
, vol.99
-
-
Brackin, S.1
Meadows, C.2
Millen, J.3
-
4
-
-
0025386404
-
A logic of authentication
-
Burrows, M.; Abadi, M.; and Needham, R. 1990. A logic of authentication. ACM TOCS 8(1):18-36.
-
(1990)
ACM TOCS
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
6
-
-
0003730235
-
-
Cambridge, MA: The MIT Press.
-
Fagin, R.; Halpern, J. Y.; Moses, Y.; and Vardi, M. Y. 1995. Reasoning about Knowledge. Cambridge, MA: The MIT Press.
-
(1995)
Reasoning about Knowledge
-
-
Fagin, R.1
Halpern, J.Y.2
Moses, Y.3
Vardi, M.Y.4
-
7
-
-
77951505493
-
Classical negation in logic programs and deductive databases
-
Gelfond, M., and Lifschitz, V. 1991. Classical negation in logic programs and deductive databases. New Generation Computing 9:365-385.
-
(1991)
New Generation Computing
, vol.9
, pp. 365-385
-
-
Gelfond, M.1
Lifschitz, V.2
-
9
-
-
70349871895
-
Formal modelling of cryptographic protocols in situation calculus
-
Published in Spanish as: Especificacíon formal de protocolos criptogr ́aficos en Ćalculo de Situaciones 2000).
-
Herńandez-Orallo, J., and Pinto, J. 1997. Formal modelling of cryptographic protocols in situation calculus. (Published in Spanish as: Especificacíon formal de protocolos criptogr ́aficos en Ćalculo de Situaciones, Novatica, 143, pp. 57-63, 2000).
-
(1997)
Novatica
, vol.143
, pp. 57-63
-
-
Herńandez-Orallo, J.1
Pinto, J.2
-
11
-
-
0003328437
-
Foundations for the situation calculus
-
Reiter, R. 2001. Knowledge in Action: Logical Foundations for Specifying and Implementing Dynamical Systems. Cambridge, MA: The MIT Press.
-
Levesque, H.; Pirri, F.; and Reiter, R. 1998. Foundations for the situation calculus. Link̈oping Electronic Articles in Computer and Information Science 3(18). Reiter, R. 2001. Knowledge in Action: Logical Foundations for Specifying and Implementing Dynamical Systems. Cambridge, MA: The MIT Press.
-
(1998)
Link̈oping Electronic Articles in Computer and Information Science
, vol.3
, Issue.18
-
-
Levesque, H.1
Pirri, F.2
Reiter, R.3
-
12
-
-
0037370247
-
Knowledge, action, and the frame problem
-
Scherl, R., and Levesque, H. 2003. Knowledge, action, and the frame problem. Artificial Intelligence 144(1-2):1-39.
-
(2003)
Artificial Intelligence
, vol.144
, Issue.1-2
, pp. 1-39
-
-
Scherl, R.1
Levesque, H.2
-
13
-
-
84888324139
-
Strand spaces: Proving security protocols correct
-
JCS 7(1). Wang, S., and Zhang, Y. 2008. In Proc. ISMIS 2008 of LNAI Springer.
-
Thayer, F.; Herzog, J.; and Guttman, J. 1999. Strand spaces: Proving security protocols correct. JCS 7(1). Wang, S., and Zhang, Y. 2008. A logic programming based framework for security protocol verification. In Proc. ISMIS 2008, volume 4994 of LNAI, 638-643. Springer.
-
(1999)
A Logic Programming Based Framework for Security Protocol Verification
, vol.4994
, pp. 638-643
-
-
Thayer, F.1
Herzog, J.2
Guttman, J.3
|