Planning Attacks to Security Protocols: Case Studies in Logic Programming

Computational Logic: Logic Programming and Beyond, pp. 533-560, 2002.

Cited by: 11|Bibtex|Views9|DOI:https://doi.org/10.1007/3-540-45628-7_20
EI
Other Links: dblp.uni-trier.de|dl.acm.org|academic.microsoft.com

Abstract:

Formal verification of security protocols has become a key issue in computer security. Yet, it has proven to be a hard task often error prone and discouraging for non-experts in formal methods.In this paper we show how security protocols can be specified and verified efficiently and effectively by embedding reasoning about actions into a ...More

Code:

Data:

Your rating :
0

 

Tags
Comments