메뉴 건너뛰기




Volumn 1895, Issue , 2000, Pages 175-190

Automating data independence

Author keywords

Automatic verification; Casper; CSP; Data independence; FDR; Model checking; Security protocols

Indexed keywords

FORMAL METHODS; NETWORK SECURITY;

EID: 84944038631     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10722599_11     Document Type: Conference Paper
Times cited : (11)

References (19)
  • 3
    • 85159695785 scopus 로고    scopus 로고
    • Fault-Preserving Simplifying Transformations for Security Protocols
    • Hui, M., Lowe, G.: Fault-Preserving Simplifying Transformations for Security Protocols. Submitted for publication (2000)
    • (2000) Submitted for Publication
    • Hui, M.1    Lowe, G.2
  • 4
    • 0038186894 scopus 로고    scopus 로고
    • A semantic study of data-independence with applications to the mechanical verification of concurrent systems
    • Lazić, R.S.: A semantic study of data-independence with applications to the mechanical verification of concurrent systems. Oxford University D.Phil thesis (1998)
    • (1998) Oxford University D.Phil Thesis
    • Lazić, R.S.1
  • 5
    • 85159673823 scopus 로고    scopus 로고
    • Using logical relations for automated verification of data-independent CSP. Proceedings of the Workshop on Automated Formal Methods (Oxford, U.K.)
    • Lazić, R.S., Roscoe, A.W.: Using logical relations for automated verification of data-independent CSP. Proceedings of the Workshop on Automated Formal Methods (Oxford, U.K.). Electronic Notes in Theoretical Computer Science 5 (1997)
    • (1997) Electronic Notes in Theoretical Computer Science , vol.5
    • Lazić, R.S.1    Roscoe, A.W.2
  • 6
    • 85159695809 scopus 로고    scopus 로고
    • Verifying determinism of data-independent systems with labellings, arrays and constants
    • Lazić, R.S., Roscoe, A.W.: Verifying determinism of data-independent systems with labellings, arrays and constants. Proceedings of INFINITY (1998)
    • (1998) Proceedings of INFINITY
    • Lazić, R.S.1    Roscoe, A.W.2
  • 8
    • 28144456308 scopus 로고
    • An Attack on the Needham-Schroeder Public-Key Authentication Protocol
    • Lowe, G.: An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters, Vol. 56 (1995) 131-133
    • (1995) Information Processing Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 9
    • 0003130993 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Springer LNCS
    • Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Proceedings of TACAS '97. Springer LNCS 1055 (1996)
    • (1996) Proceedings of TACAS '97 , pp. 1055
    • Lowe, G.1
  • 15
    • 84864111084 scopus 로고    scopus 로고
    • The theory and practice of concurrency
    • Roscoe, A.W.: The theory and practice of concurrency. Prentice Hall (1998)
    • (1998) Prentice Hall
    • Roscoe, A.W.1
  • 17
    • 0033344294 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • Special Issue CSFW11
    • Roscoe, A.W., Broadfoot, P.J.: Proving security protocols with model checkers by data independence techniques. Journal of Computer Security. Special Issue CSFW11 (1999) 147-190
    • (1999) Journal of Computer Security , pp. 147-190
    • Roscoe, A.W.1    Broadfoot, P.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.