-
2
-
-
0025386404
-
-
February, Parts and versions of this material have been presented in many places including ACM Transactions on Computer Systems, 8(1): 18-36, Feb. 1990. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990
-
Michael Burrows, Martin Abadi, and Roger Needham. A Logic of Authentication. Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including ACM Transactions on Computer Systems, 8(1): 18-36, Feb. 1990. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990.
-
(1989)
A Logic of Authentication. Research Report 39, Digital Systems Researchcenter
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
0011936788
-
Rejoinder to Nessett
-
Michael Burrows, Martin Abadi, and Roger Needham. Rejoinder to Nessett. ACM Operating Systems Review, 24(2):39-40, April 1990.
-
(1990)
ACM Operating Systems Review
, vol.24
, Issue.2
, pp. 39-40
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
4
-
-
0025641513
-
A Logic of Communication in Hostile Environment
-
IEEE Computer Society Press, Los Alamitos, California
-
Pierre Bieber. A Logic of Communication in Hostile Environment, In Proc. Computer Security Foundations Workshop 3. IEEE Computer Society Press, Los Alamitos, California, June 1990.
-
(1990)
Proc. Computer Security Foundations Workshop
, vol.3
-
-
Bieber, P.1
-
5
-
-
0003400251
-
Secure Computer Systems: Mathematical Foundations and Model, Technical Report M74-244
-
Bedford, MA
-
E. Bell and L. J. La Padula. Secure Computer Systems: Mathematical Foundations and Model, Technical Report M74-244• The MITRE Corporation, Bedford, MA, October 1974.
-
(1974)
The MITRE Corporation
-
-
Bell, E.1
La Padula, L.J.2
-
7
-
-
0022706656
-
Automatic Verification of Finite-State Concurrent Systems Using Temporal Logic Specifications
-
M. Clarke, E. A. Emerson, and A. P. Sistla. Automatic Verification of Finite-State Concurrent Systems Using Temporal Logic Specifications. ACM Transactions on Programming Languages and Systems, 8(2):244-263, April 1986.
-
(1986)
ACM Transactions on Programming Languages and Systems
, vol.8
, Issue.2
, pp. 244-263
-
-
Clarke, M.1
Emerson, E.A.2
Sistla, A.P.3
-
12
-
-
84860566244
-
-
DIM ACS Series in Discrete Mathematics and Theoretical Computer Science, AMS and ACM
-
Joan Feigenbaum and Michael Merritt, editors. Distributed Computing and Cryptography, volume 2 of DIM ACS Series in Discrete Mathematics and Theoretical Computer Science, AMS and ACM, 1991
-
(1991)
Editors. Distributed Computing and Cryptography
, vol.2
-
-
Feigenbaum, J.1
Merritt, M.2
-
14
-
-
85028743437
-
Logics for Cryptographic Protocols - Virtues and Limitations
-
IEEE Computer Society Press, Los Alamitos, California
-
V.D. Gligor, R. Kailar, S. Stubblebine, and L. Gong. Logics for Cryptographic Protocols - Virtues and Limitations. In Proceedings of the Computer Security Foundations Workshop 4, pages 219-226. IEEE Computer Society Press, Los Alamitos, California, 1991.
-
(1991)
Proceedings of the Computer Security Foundations Workshop
, vol.4
, pp. 219-226
-
-
Gligor, V.D.1
Kailar, R.2
Stubblebine, S.3
Gong, L.4
-
16
-
-
0025023289
-
Reasoning about Belief in Cryptographic Protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
Li Gong, Roger Needham, and Raphael Yahalom. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the 1990 IEEE Symposium on Security and Privacy, pages 234-248. IEEE Computer Society Press, Los Alamitos, California, 1990.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Security and Privacy
, pp. 234-248
-
-
Li, G.1
Needham, R.2
Yahalom, R.3
-
17
-
-
0026850049
-
A Logical Approach to Multilevel Security of Probabilistic Systems
-
IEEE Computer Society Press, Los Alamitos, California
-
James W. Gray, and Paul F. Syverson. A Logical Approach to Multilevel Security of Probabilistic Systems. In Proceedings of the 1992 IEEE Symposium on Security and Privacy, pages 164-176. IEEE Computer Society Press, Los Alamitos, California, 1992.
-
(1992)
Proceedings of the 1992 IEEE Symposium on Security and Privacy
, pp. 164-176
-
-
Gray, J.W.1
Syverson, P.F.2
-
20
-
-
0025460546
-
Halpern andYoram Moses. Knowledge and Common Knowledge in a Distributed Environment
-
Joseph Y. Halpern and Yoram Moses. Knowledge and Common Knowledge in a Distributed Environment. JACM, 37(3):549-587, July 1990.
-
(1990)
JACM
, vol.37
, Issue.3
, pp. 549-587
-
-
Joseph, Y.1
-
21
-
-
0023248072
-
Kemmerer. Using Formal Verification Techniques to Analyze Cryptographic Protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
Richard A. Kemmerer. Using Formal Verification Techniques to Analyze Cryptographic Protocols. In Proceedings of the. 1987 IEEE Symposium on Security and Privacy, pages 134-139. IEEE Computer Society Press, Los Alamitos, California, 1987.
-
(1987)
Proceedings of The. 1987 IEEE Symposium on Security and Privacy
, pp. 134-139
-
-
Richard, A.1
-
22
-
-
85068233104
-
On Belief Evolution in Authentication Protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
Rajashekar Kailar and Virgil D. Gligor. On Belief Evolution in Authentication Protocols, In Proceedings of the Computer Security Foundations Workshop 4, pages 103-116. IEEE Computer Society Press, Los Alamitos, California, 1991.
-
(1991)
Proceedings of the Computer Security Foundations Workshop
, vol.4
, pp. 103-116
-
-
Kailar, R.1
Gligor, V.D.2
-
23
-
-
0040683489
-
-
Jonathan Lear, Cambridge University Press, Cambridge
-
Jonathan Lear. Aristotle and Logical Theory. Cambridge University Press, Cambridge, 1980.
-
(1980)
Aristotle and Logical Theory
-
-
-
24
-
-
84976699318
-
The Byzantine Generals Problem
-
Leslie Lamport, Robert Shostak, and Marshall Pease. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
25
-
-
0023295108
-
The INTERROGATOR: Protocol Security Analysis
-
J. K. Millen, S. C. Clark, and S. B. Freedman. The INTERROGATOR: Protocol Security Analysis. IEEE Transactions on Software Engineering, SE- 13(2):274-288, February 1987.
-
(1987)
IEEE Transactions on Software Engineering, SE
, vol.13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
26
-
-
84974771580
-
The Computer Security Foundations Workshop
-
John McLean. The Computer Security Foundations Workshop. IEEE Cipher, pages 15-23, January 1989.
-
(1989)
IEEE Cipher
, pp. 15-23
-
-
McLean, J.1
-
27
-
-
0024665570
-
-
Using Narrowing in the Analysis of Key Management Protocols. In Proceedings of the, IEEE Computer Society Press, Los Alamitos, California
-
Catherine A. Meadows. Using Narrowing in the Analysis of Key Management Protocols. In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 138-147. IEEE Computer Society Press, Los Alamitos, California, 1989.
-
(1989)
IEEE Symposium on Security and Privacy
, pp. 138-147
-
-
Meadows, C.A.1
-
28
-
-
84974767090
-
Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol
-
NRL, September
-
Catherine A. Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol. Formal Report 9265, NRL, September 1990.
-
(1990)
Formal Report
, vol.9265
-
-
Catherine, A.1
-
29
-
-
0025599775
-
Representing Partial Knowledge in an Algebraic Security Model
-
IEEE Computer Society Press, Los Alamitos, California
-
Catherine A. Meadows. Representing Partial Knowledge in an Algebraic Security Model. In Proceedings of the Computer Security Foundations Workshop 3, pages 23-31. IEEE Computer Society Press, Los Alamitos, California, 1990.
-
(1990)
Proceedings of the Computer Security Foundations Workshop
, vol.3
, pp. 23-31
-
-
Meadows, C.A.1
-
30
-
-
0021190844
-
The INTERROGATOR: A Tool for Cryptographic Protocol Security
-
IEEE Computer Society Press; Los Alamitos, California
-
Jonathan K. Millen. The INTERROGATOR: A Tool for Cryptographic Protocol Security. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, pages 138-141. IEEE Computer Society Press; Los Alamitos, California, 1984.
-
(1984)
Proceedings of the 1984 IEEE Symposium on Security and Privacy
, pp. 138-141
-
-
Millen, J.K.1
-
31
-
-
0025405980
-
A Critique of the Burrows, Abadi, and Needham Logic
-
Dan M. Nessett. A Critique of the Burrows, Abadi, and Needham Logic. ACM Operating Systems Review, 24(2):35-38, April 1990.
-
(1990)
ACM Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
33
-
-
0026850090
-
Roles in Cryptographic Protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
Einar Snekkenes. Roles in Cryptographic Protocols. In Proceedings of the 1992 IEEE Symposium on Security and Privacy, pages 105-119. IEEE Computer Society Press, Los Alamitos, California, 1992.
-
(1992)
Proceedings of the 1992 IEEE Symposium on Security and Privacy
, pp. 105-119
-
-
Snekkenes, E.1
-
34
-
-
84974771695
-
Syverson. A Logic for the Analysis of Cryptographic Protocols
-
NRL, December
-
Paul F. Syverson. A Logic for the Analysis of Cryptographic Protocols. Formal Report 9305, NRL, December 1990.
-
(1990)
Formal Report
, vol.9305
-
-
Paul, F.1
-
35
-
-
0026153654
-
Syverson. The Use of Logic in the Analysis of Cryptographic Protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
Paul F. Syverson. The Use of Logic in the Analysis of Cryptographic Protocols. In Proceedings of the 1991 IEEE Symposium on Security and Privacy, pages 156-170. IEEE Computer Society Press, Los Alamitos, California, 1991.
-
(1991)
Proceedings of the 1991 IEEE Symposium on Security and Privacy
, pp. 156-170
-
-
Paul, F.1
|