메뉴 건너뛰기




Volumn 1, Issue , 2000, Pages 251-265

Formal specification and analysis of active networks and communication protocols: The Maude experience

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVE NETWORKS; FORMAL SPECIFICATION; MODEL CHECKING; MODELING LANGUAGES; NETWORK PROTOCOLS; SPECIFICATIONS;

EID: 84961707449     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2000.825030     Document Type: Conference Paper
Times cited : (35)

References (44)
  • 8
    • 84874264374 scopus 로고    scopus 로고
    • From Rewrite Theories to Temporal Logic Theories
    • H. Kirchner and C. Kirchner, editors, 2nd Int. Workshop on Rewriting Logic and Its Applications (WRLA'98), Pont-A-Mousson, France, September 1-4, 1998. Elsevier Science B.V.
    • G. Denker. From Rewrite Theories to Temporal Logic Theories. In H. Kirchner and C. Kirchner, editors, 2nd Int. Workshop on Rewriting Logic and Its Applications (WRLA'98), Pont-A-Mousson, France, September 1-4, 1998. Elsevier Science B.V., Volume 15 of Electronic Notes in Theoretical Computer Science, http://www.elsevier.nl/locate/entcs/volume15.html, 1998.
    • (1998) Electronic Notes in Theoretical Computer Science , vol.15
    • Denker, G.1
  • 12
    • 0004073041 scopus 로고    scopus 로고
    • CAPSL and CIL Language Design: A Common Authentication Protocol Specification Language and Its Intermediate Language
    • Computer Science Laboratory, SRI International, Menlo Park, CA 94025
    • G. Denker and J. Millen. CAPSL and CIL Language Design: A Common Authentication Protocol Specification Language and Its Intermediate Language. CSL Report SRI-CSL-99-02, Computer Science Laboratory, SRI International, Menlo Park, CA 94025, 1999. http://www.csl.sri.com/~denker/pub-99.html.
    • (1999) CSL Report
    • Denker, G.1    Millen, J.2
  • 16
    • 84976665942 scopus 로고
    • Timestamps in Key Distribution Protocols
    • D. E. Denning and G. M. Sacco. Timestamps in Key Distribution Protocols. Communications of the ACM, 24(8):533-536, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 18
    • 0002211360 scopus 로고    scopus 로고
    • Logics for Specifying Concurrent Information Systems
    • J. Chomicki and G. Saake, editors, Kluwer Academic Publishers
    • H.-D. Ehrich, C. Caleiro, A. Sernadas, and G. Denker. Logics for Specifying Concurrent Information Systems. In J. Chomicki and G. Saake, editors, Logics for Databases and Information Systems, pages 167-198. Kluwer Academic Publishers, 1998.
    • (1998) Logics for Databases and Information Systems , pp. 167-198
    • Ehrich, H.-D.1    Caleiro, C.2    Sernadas, A.3    Denker, G.4
  • 20
    • 84961754353 scopus 로고    scopus 로고
    • Manuscript; University of California at Santa Cruz, Computer Science Department, January
    • J. J. García-Luna. Reliable Broadcasing in Computer Networks. Manuscript; University of California at Santa Cruz, Computer Science Department, January 1998.
    • (1998) Reliable Broadcasing in Computer Networks
    • García-Luna, J.J.1
  • 21
    • 0029528751 scopus 로고
    • Using Temporal Logic to Specify and Verify Cryptographic Protocols (Progress Report)
    • IEEE Computer Society Press
    • J. W. Gray and J. D. McLean. Using Temporal Logic to Specify and Verify Cryptographic Protocols (Progress Report). In Proc. of the 8th IEEE Computer Security Foundations Workshop, pages 108-116. IEEE Computer Society Press, 1995.
    • (1995) Proc. of the 8th IEEE Computer Security Foundations Workshop , pp. 108-116
    • Gray, J.W.1    McLean, J.D.2
  • 24
    • 4243768442 scopus 로고    scopus 로고
    • Modal-μ-Maude - Specification and Properties of Concurrent Objects
    • B. Freitag and C.B. Jones and C. Lengauer and H.-J. Schek, editor, Kluwer
    • U. Lechner and C. Lengauer. Modal-μ-Maude - Specification and Properties of Concurrent Objects. In B. Freitag and C.B. Jones and C. Lengauer and H.-J. Schek, editor, Object Orientation with Parallelism and Persistence, pages 23-46. Kluwer, 1996.
    • (1996) Object Orientation with Parallelism and Persistence , pp. 23-46
    • Lechner, U.1    Lengauer, C.2
  • 25
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceedings of TACAS, Springer-Verlag
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 26
    • 84955602379 scopus 로고
    • Formal Verification of Cryptographic Protocols: A Survey
    • J. Pieprzyk and R. Savafi-Naini, editors, Advances in Cryptology - Asiacrypt '94, Springer
    • C. A. Meadows. Formal Verification of Cryptographic Protocols: A Survey. In J. Pieprzyk and R. Savafi-Naini, editors, Advances in Cryptology - Asiacrypt '94, pages 133-150. Springer, 1995. LNCS 917.
    • (1995) LNCS , vol.917 , pp. 133-150
    • Meadows, C.A.1
  • 27
    • 84949740740 scopus 로고    scopus 로고
    • Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches
    • E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Proc. of European Symposium on Research in Computer Security (ESORICS'96), Springer
    • C. A. Meadows. Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Proc. of European Symposium on Research in Computer Security (ESORICS'96), pages 351-364. Springer, 1996. LNCS 1146.
    • (1996) LNCS , vol.1146 , pp. 351-364
    • Meadows, C.A.1
  • 28
    • 0029700221 scopus 로고    scopus 로고
    • Language Generation and Verification in the NRL Protocol Analyzer
    • IEEE Computer Society Press, June
    • C. A. Meadows. Language Generation and Verification in the NRL Protocol Analyzer. In Proc. 9th Computer Security Foundations Workshop, pages 48-61. IEEE Computer Society Press, June 1996.
    • (1996) Proc. 9th Computer Security Foundations Workshop , pp. 48-61
    • Meadows, C.A.1
  • 29
    • 0027113376 scopus 로고
    • Conditional Rewriting Logic as a Unified Model of Concurrency
    • J. Meseguer. Conditional Rewriting Logic as a Unified Model of Concurrency. Theoretical Computer Science, 96(1):73-155, 1992.
    • (1992) Theoretical Computer Science , vol.96 , Issue.1 , pp. 73-155
    • Meseguer, J.1
  • 30
    • 0002893365 scopus 로고
    • A Logical Theory of Concurrent Objects and Its Realization in the Maude Language
    • G. Agha, P. Wegner, and A. Yonezawa, editors, The MIT Press
    • J. Meseguer. A Logical Theory of Concurrent Objects and Its Realization in the Maude Language. In G. Agha, P. Wegner, and A. Yonezawa, editors, Research Directions in Concurrent Object-Oriented Programming, pages 314-390. The MIT Press, 1993.
    • (1993) Research Directions in Concurrent Object-Oriented Programming , pp. 314-390
    • Meseguer, J.1
  • 31
    • 84961699668 scopus 로고    scopus 로고
    • Rewriting Logic and Its Applications
    • First International Workshop, Asilomar Conference Center, Pacific Grove, CA, September 3-6, 1996. Elsevier Science B.V.
    • J. Meseguer, editor. Rewriting Logic and Its Applications, First International Workshop, Asilomar Conference Center, Pacific Grove, CA, September 3-6, 1996. Elsevier Science B.V., Electronic Notes in Theoretical Computer Science, Volume 4, http://www.elsevier.nl/locate/entcs/volume4.html, 1996.
    • (1996) Electronic Notes in Theoretical Computer Science , vol.4
    • Meseguer, J.1
  • 32
    • 84955586238 scopus 로고    scopus 로고
    • Rewriting logic as a semantic framework for concurrency: A progress report
    • Proc. CONCUR'96, Pisa, August 1996, Springer
    • J. Meseguer. Rewriting logic as a semantic framework for concurrency: a progress report. In Proc. CONCUR'96, Pisa, August 1996, pages 331-372. Springer LNCS 1119, 1996.
    • (1996) LNCS , vol.1119 , pp. 331-372
    • Meseguer, J.1
  • 33
    • 84955586238 scopus 로고    scopus 로고
    • Rewriting Logic as a Semantic Framework for Concurrency: A Progress Report
    • U. Montanari and V. Sassone, editors, Proc. 7th Intern. Conf. on Concurrency Theory: CONCUR'96, Pisa, August 1996
    • J. Meseguer. Rewriting Logic as a Semantic Framework for Concurrency: A Progress Report. In U. Montanari and V. Sassone, editors, Proc. 7th Intern. Conf. on Concurrency Theory: CONCUR'96, Pisa, August 1996, pages 331-372, 1996. LNCS 1119.
    • (1996) LNCS , vol.1119 , pp. 331-372
    • Meseguer, J.1
  • 34
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 35
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.1
  • 38
    • 0028257391 scopus 로고
    • Critical system properties: Survey and taxonomy
    • J. Rushby. Critical system properties: Survey and taxonomy. Reliability Engineering and System Safety, 43(2):189-219, 1994.
    • (1994) Reliability Engineering and System Safety , vol.43 , Issue.2 , pp. 189-219
    • Rushby, J.1
  • 39
    • 0007660344 scopus 로고
    • Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, June Unpublished project report
    • J. Rushby. Combining system properties: A cautionary example and formal examination. Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, June 1995. Unpublished project report; available at http://www.csl.sri.com/?rushby/combined.html.
    • (1995) Combining System Properties: A Cautionary Example and Formal Examination
    • Rushby, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.