메뉴 건너뛰기




Volumn 6, Issue 1, 2004, Pages 38-66

A logical encoding of the π-calculus: Model checking mobile processes using tabled resolution

Author keywords

calculus; Logic programming; Mobile processes; Model checking; Tabled resolution

Indexed keywords

DYNAMIC GENERATION; EFFICIENT IMPLEMENTATION; EXTRUSION AND INTRUSION; LOGICAL ENCODING; MOBILE PROCESS; MOBILE SYSTEMS; PROCESS EXPRESSION; TABLED RESOLUTION;

EID: 84896693740     PISSN: 14332779     EISSN: 14332787     Source Type: Journal    
DOI: 10.1007/s10009-003-0136-3     Document Type: Article
Times cited : (18)

References (45)
  • 3
    • 0000298407 scopus 로고    scopus 로고
    • A bisimulation method for cryptographic protocols
    • Abadi M, Gordon AD (1998) A bisimulation method for cryptographic protocols. Nordic J Comput 5(4):267-303
    • (1998) Nordic J Comput , vol.5 , Issue.4 , pp. 267-303
    • Abadi, M.1    Gordon, A.D.2
  • 9
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Warsaw, Poland, April 2003. Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Blanchet B, Podelski A (2003) Verification of cryptographic protocols: tagging enforces termination. In: Proceedings of the conference on foundations of software science and computation structures (FoSSaCS'03), Warsaw, Poland, April 2003. Lecture notes in computer science, vol 2620. Springer, Berlin Heidelberg New York, pp 136-152
    • (2003) Proceedings of the Conference On Foundations of Software Science and Computation Structures (FoSSaCS'03) , vol.2620 , pp. 136-152
    • Blanchet, B.1    Podelski, A.2
  • 10
    • 0013126638 scopus 로고    scopus 로고
    • A logic of authentication, from Proceedings of the Royal Society 426(1871)
    • In: Stallings W, IEEE Press, New York
    • Burrows M, Abadi M, Needham R (1996) A logic of authentication, from Proceedings of the Royal Society 426(1871), 1989. In: Stallings W (ed) Practical cryptography for data Internetworks. IEEE Press, New York
    • (1996) Practical Cryptography For Data Internetworks , pp. 1989
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 11
    • 0029695436 scopus 로고    scopus 로고
    • Tabled evaluation with delaying for general logic programs
    • Chen W, Warren DS (1996) Tabled evaluation with delaying for general logic programs. J ACM 43(1):20-74
    • (1996) J ACM , vol.43 , Issue.1 , pp. 20-74
    • Chen, W.1    Warren, D.S.2
  • 13
    • 84867776654 scopus 로고    scopus 로고
    • A system for tabled constraint logic programming
    • London, UK, July 2000. Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Cui B, Warren DS (2000) A system for tabled constraint logic programming. In: Proceedings of the 1st international conference on computational logic, London, UK, July 2000. Lecture notes in computer science, vol 1861. Springer, Berlin Heidelberg New York, pp 478-492
    • (2000) Proceedings of the 1st International Conference On Computational Logic , vol.1861 , pp. 478-492
    • Cui, B.1    Warren, D.S.2
  • 17
    • 84944872561 scopus 로고    scopus 로고
    • Principles of mobile Maude
    • In: Kotz D, Mattern F, Switzerland, September 2000. Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Duran F, Eker S, Lincoln P, Meseguer J (2000) Principles of mobile Maude. In: Kotz D, Mattern F (eds) Proceedings of ASA/MA, Switzerland, September 2000. Lecture notes in computer science, vol 1882. Springer, Berlin Heidelberg New York, pp 73-85
    • (2000) Proceedings of ASA/MA , vol.1882 , pp. 73-85
    • Duran, F.1    Eker, S.2    Lincoln, P.3    Meseguer, J.4
  • 21
    • 0002734357 scopus 로고
    • Technical report, School of Cognitive and Computer Science, University of Sussex, Sussex, UK
    • Lin H (1994) Symbolic bisimulation and proof systems for the π-calculus. Technical report, School of Cognitive and Computer Science, University of Sussex, Sussex, UK
    • (1994) Symbolic Bisimulation and Proof Systems For the π-calculus
    • Lin, H.1
  • 23
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Lowe G (1995) An attack on the Needham-Schroeder public-key authentication protocol. Inf Process Lett 56(3):131-133
    • (1995) Inf Process Lett , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 24
    • 26444574191 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Lowe G (1996) Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Softw Concepts Tools 17:93-102
    • (1996) Softw Concepts Tools , vol.17 , pp. 93-102
    • Lowe, G.1
  • 25
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows C (1996) The NRL protocol analyzer: an overview. J Logic Programm 26(2):113-131
    • (1996) J Logic Programm , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 27
    • 0003954103 scopus 로고
    • Communication and concurrency
    • Prentice-Hall, Upper Saddle River, NJ
    • Milner R (1989) Communication and concurrency. In: International Series in Computer Science. Prentice-Hall, Upper Saddle River, NJ
    • (1989) International Series In Computer Science
    • Milner, R.1
  • 28
    • 0000511698 scopus 로고
    • The polyadic π-calculus: A tutorial
    • Bauer FL, Brauer W, Schwichtenberg H (eds), Springer, Berlin Heidelberg New York
    • Milner R (1993) The polyadic π-calculus: a tutorial. In: Bauer FL, Brauer W, Schwichtenberg H (eds) Logic and algebra of specification. Springer, Berlin Heidelberg New York, pp 203-246
    • (1993) Logic and Algebra of Specification , pp. 203-246
    • Milner, R.1
  • 29
    • 44049113210 scopus 로고
    • A calculus of mobile processes, parts I and II
    • Milner R, Parrow J, Walker D (1992) A calculus of mobile processes, parts I and II. Inf Comput 100(1):1-77
    • (1992) Inf Comput , vol.100 , Issue.1 , pp. 1-77
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 31
    • 0000335030 scopus 로고
    • An algebraic verification of a mobile network
    • Orava F, Parrow J (1992) An algebraic verification of a mobile network. Formal Aspects Comput 4:497-543
    • (1992) Formal Aspects Comput , vol.4 , pp. 497-543
    • Orava, F.1    Parrow, J.2
  • 32
    • 0010728871 scopus 로고    scopus 로고
    • An introduction to the π-calculus
    • Bergstra JA, Ponse A, Smolka SA (eds), Elsevier, Amsterdam
    • Parrow J (2001) An introduction to the π-calculus. In: Bergstra JA, Ponse A, Smolka SA (eds) Handbook of process algebra. Elsevier, Amsterdam
    • (2001) Handbook of Process Algebra
    • Parrow, J.1
  • 33
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L (1998) The inductive approach to verifying cryptographic protocols. J Comput Secur 6:85-128
    • (1998) J Comput Secur , vol.6 , pp. 85-128
    • Paulson, L.1
  • 36
    • 0001132880 scopus 로고
    • Local model checking in the modal mu-calculus
    • Stirling C, Walker D (1991) Local model checking in the modal mu-calculus. Theor Comput Sci 89(1):161-177
    • (1991) Theor Comput Sci , vol.89 , Issue.1 , pp. 161-177
    • Stirling, C.1    Walker, D.2
  • 40
  • 41
    • 19044388279 scopus 로고
    • Technical report, Department of Computer Systems, Uppsala University, Sweden
    • Victor B (1995) The Mobility Workbench user's guide. Technical report, Department of Computer Systems, Uppsala University, Sweden
    • (1995) The Mobility Workbench User's Guide
    • Victor, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.