메뉴 건너뛰기




Volumn 1998-November, Issue , 1998, Pages 26-38

A symbiotic relationship between formal methods and security

Author keywords

[No Author keywords available]

Indexed keywords

MODEL CHECKING; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 85047929615     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSDA.1998.798355     Document Type: Conference Paper
Times cited : (35)

References (39)
  • 2
    • 85051835099 scopus 로고
    • Fundamentals of computer security technology
    • E. Amoroso. Fundamentals of Computer Security Technology. AT&T Bel] Laboratories, 1994.
    • (1994) AT&T Bel] Laboratories
    • Amoroso, E.1
  • 4
    • 0024905645 scopus 로고
    • An approach to systems verification
    • See also three other articles in the same issue by Young, Moore, and Hunt
    • W. R. Bevier, W. A. Hunt, Jr., J S. Moore, and W. D. Young. An approach to systems verification. Journal of Automated Reasoning, 5: 411-428, 1989. See also three other articles in the same issue by Young, Moore, and Hunt.
    • (1989) Journal of Automated Reasoning , vol.5 , pp. 411-428
    • Bevier, W.R.1    Hunt, W.A.2    Moore, J.S.3    Young, W.D.4
  • 14
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • March
    • D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(2): 198-208, March 1989.
    • (1989) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 15
    • 84949641590 scopus 로고    scopus 로고
    • Using a PVS embedding of CSP to verify authentication protocols
    • August . LNCS
    • B. Dutertre and S. Schneider. Using a PVS embedding of CSP to verify authentication protocols. In Theorem Proving in Higher Order Logics, pages 121-136, August 1997. LNCS 1275.
    • (1997) Theorem Proving in Higher Order Logics , vol.1275 , pp. 121-136
    • Dutertre, B.1    Schneider, S.2
  • 17
    • 0029755480 scopus 로고    scopus 로고
    • Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions
    • San Francisco, CA, March
    • B. Guha and B. Mukherjee. Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions. In Proc. IEEE Infocom'96, pages 603-610, San Francisco, CA, March 1996.
    • (1996) Proc. IEEE Infocom'96 , pp. 603-610
    • Guha, B.1    Mukherjee, B.2
  • 18
    • 0001924088 scopus 로고    scopus 로고
    • A model for secure protocols and their compositions
    • January
    • N, Heintze and J. Tygar, A model for secure protocols and their compositions. IEEE Transactions on Software Engineering, 22(l): 16-30, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 16-30
    • Heintze, N.1    Tygar, J.2
  • 22
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C, Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2): 79-l3Q, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79l3Q
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 29
    • 0022012611 scopus 로고
    • A comment on the basic security theorem of bell and lapadula
    • J. McLean. A Comment on the Basic Security Theorem of Bell and LaPadula. Information Processing Letters, 20, 1985
    • (1985) Information Processing Letters , pp. 20
    • McLean, J.1
  • 30
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • C. Meadows. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1: 5-53, 1992.
    • (1992) Journal of Computer Security , vol.1 , pp. 5-53
    • Meadows, C.1
  • 31
    • 85051797133 scopus 로고    scopus 로고
    • Analysis of the internet key exchange protocol using the nrl protocol analyzer
    • C-Meadows. Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer, submitted to 1999 Security and Privacy, 1998.
    • (1998) 1999 Security and Privacy
    • Meadows, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.