메뉴 건너뛰기




Volumn 8688 LNCS, Issue , 2014, Pages 192-211

A lightweight formal approach for analyzing security of web protocols

Author keywords

Federated Identity; Security Protocols; Web Security

Indexed keywords

MODEL CHECKING; NETWORK SECURITY; FORMAL LOGIC; MODELING LANGUAGES;

EID: 84906731380     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-11379-1_10     Document Type: Conference Paper
Times cited : (8)

References (30)
  • 1
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. Journal of the ACM (JACM) 52(1), 102-146 (2005)
    • (2005) Journal of the ACM (JACM) , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 8
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4), 363-434 (2009)
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 16
    • 67650240831 scopus 로고    scopus 로고
    • Unbounded verification, falsification, and characterization of security protocols by pattern refinement
    • ACM
    • Cremers, C.: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 119-128. ACM (2008)
    • (2008) Proceedings of the 15th ACM Conference on Computer and Communications Security , pp. 119-128
    • Cremers, C.1
  • 17
    • 67650233415 scopus 로고    scopus 로고
    • Comparing state spaces in automatic security protocol analysis
    • Cortier, V., Kirchner, C., Okada, M., Sakurada, H. (eds.) Formal to Practical Security. Springer, Heidelberg
    • Cremers, C.J.F., Lafourcade, P., Nadeau, P.: Comparing state spaces in automatic security protocol analysis. In: Cortier, V., Kirchner, C., Okada, M., Sakurada, H. (eds.) Formal to Practical Security. LNCS, vol. 5458, pp. 70-94. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5458 , pp. 70-94
    • Cremers, C.J.F.1    Lafourcade, P.2    Nadeau, P.3
  • 24
    • 82055189997 scopus 로고    scopus 로고
    • Model driven security analysis of IDaaS protocols
    • Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) ICSOC 2011. Springer, Heidelberg
    • Kumar, A.: Model driven security analysis of IDaaS protocols. In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) ICSOC 2011. LNCS, vol. 7084, pp. 312-327. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7084 , pp. 312-327
    • Kumar, A.1
  • 26
    • 0025405980 scopus 로고
    • A critique of the Burrows, Abadi and Needham logic
    • Nessett, D.: A critique of the Burrows, Abadi and Needham logic. ACM SIGOPS Operating Systems Review 24(2), 35-38 (1990)
    • (1990) ACM SIGOPS Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.1
  • 28
    • 84957071248 scopus 로고    scopus 로고
    • Automatic verification of cryptographic protocols with SETHEO
    • McCune, W. (ed.) CADE 1997. Springer, Heidelberg
    • Schumann, J.: Automatic verification of cryptographic protocols with SETHEO. In: McCune, W. (ed.) CADE 1997. LNCS, vol. 1249, pp. 87-100. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1249 , pp. 87-100
    • Schumann, J.1
  • 29
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • Song, D., Berezin, S., Perrig, A.: Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security 9(1/2), 47-74 (2001)
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.