[图书][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

[图书][B] A framework for decentralised trust reasoning

A Abdul-Rahman - 2005 - search.proquest.com
Recent developments in the pervasiveness and mobility of computer systems in open
computer networks have invalidated traditional assumptions about trust in computer …

[PDF][PDF] 一种电子商务协议形式化分析方法

卿斯汉 - 软件学报, 2005 - jos.org.cn
提出了一种新颖的形式化方法, 可以用于分析电子商务协议的安全性质, 例如可追究性和公平性.
与以前的工作相比较, 主要贡献在于:(1) 对协议主体的拥有集合给出了形式化定义 …

[图书][B] Security analysis of network protocols: Compositional reasoning and complexity-theoretic foundations

A Datta - 2005 - search.proquest.com
This dissertation addresses two central problems associated with the design and security
analysis of network protocols that use cryptographic primitives. The first is the protocol …

[PDF][PDF] A completeness result for BAN logic

M Cohen, M Dam - Prococeedings of Methods for Modalities, 2005 - csc.kth.se
BAN logic is a propositional logic of knowledge for the verification of cryptographic protocols.
While BAN logic has been successful from a practical point of view, the semantics of the …

A temporalised belief logic for specifying the dynamics of trust for multi-agent systems

C Liu, MA Ozols, M Orgun - Advances in Computer Science-ASIAN 2004 …, 2005 - Springer
Temporalisation is a methodology for combining logics whereby a given logic system can be
enriched with temporal features to create a new logic system. TML (Typed Modal Logic) …

[PDF][PDF] Logical omniscience in the semantics of BAN logic

M Cohen, M Dam - Proceedings of the Foundations of Computer Security, 2005 - Citeseer
BAN logic is an epistemic logic for verification of cryptographic protocols. A number of
semantics have been proposed for BAN logic, but none of them capture the intended …

Security analysis of efficient (Un-) fair non-repudiation protocols

S Gürgens, C Rudolph - Formal Aspects of Computing, 2005 - Springer
An approach to protocol analysis using asynchronous product automata (APA) and the
simple homomorphism verification tool (SHVT) is demonstrated on several variants of the …

Formal analysis of modern security protocols

A Yasinsac, J Childs - Information Sciences, 2005 - Elsevier
Analyzing security protocols is notoriously difficult. In this paper, we show how a novel tool
for analyzing classical cryptographic protocols can be used to model and analyze complex …

Extending security protocol analysis: New challenges

M Bond, J Clulow - Electronic Notes in Theoretical Computer Science, 2005 - Elsevier
We argue that formal analysis tools for security protocols are not achieving their full
potential, and give only limited aid to designers of more complex modern protocols …