221,040 Hits in 2.5 sec

A logic of authentication

M. Burrows, M. Abadi, R. Needham
1989 Proceedings of the twelfth ACM symposium on Operating systems principles - SOSP '89  
A simple logic has allowed us to describe the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication.  ...  We have been able to explain a variety of authentication protocols formally, to discover subtleties and errors in them, and to suggest improvements.  ...  ACKNOWLEDGMENTS The work was undertaken as the result of a suggestion by Butler Lampson.  ... 
doi:10.1145/74850.74852 dblp:conf/sosp/BurrowsAN89 fatcat:2y4e64njbzbkffm26o6gu2oxf4

A logic of authentication

Michael Burrows, Martin Abadi, Roger Needham
1990 ACM Transactions on Computer Systems  
A simple logic has allowed us to describe the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication.  ...  We have been able to explain a variety of authentication protocols formally, to discover subtleties and errors in them, and to suggest improvements.  ...  ACKNOWLEDGMENTS The work was undertaken as the result of a suggestion by Butler Lampson.  ... 
doi:10.1145/77648.77649 fatcat:3mihwfivx5hlvgki2vwryvream

A logic of authentication

M. Burrows, M. Abadi, R. Needham
1989 ACM SIGOPS Operating Systems Review  
A siinple logic 1ia.s aHowed us to describe the beliefs of trustworthy parties involved iii a~utllentica.tioil protocols alit1 the evol11tioii of these beliefs as a consequence of conliiiunicat,ioii.  ...  Iii this p"l"rr we pleseut, the logic al~rl t,lleil give the results of 011r aimlysis of four l~~~l~lisl~etl 1xotocols, clxxxzii either liecilllsc of their pract.ica,l iinpc)rtance or Ixcn.use they serve  ...  Iii t,liis ya.per we defiiie a logic of a.~lt,lieiitica.tion to express such beliefs precisely snd to captlue the reasoning tlmt lexls to them.  ... 
doi:10.1145/74851.74852 fatcat:pvwkfrbhhjhm7jko4ace7emm5i

Adding time to a logic of authentication

Paul F. Syverson
1993 Proceedings of the 1st ACM conference on Computer and communications security - CCS '93  
Much of the confusion was cleared up when Abadi and Turtle provided a semantics for a version of that logic (AT) in [AT91] .  ...  In [BAN89] Burrows, Abadi, and Needham presented a logic (BAN) for analyzing cryptographic protocols in terms of belief.  ...  Acknowledgements I thank the anonymous referees for helpful comments on a draft of this paper.  ... 
doi:10.1145/168588.168600 dblp:conf/ccs/Syverson93 fatcat:6qrn2raoxbdgxcuz66u6cqo6am

A semantics for a logic of authentication (extended abstract)

Martín Abadi, Mark R. Tuttle
1991 Proceedings of the tenth annual ACM symposium on Principles of distributed computing - PODC '91  
Burrows, Abadi, and Needham have proposed a logic for the analysis of authentication protocols.  ...  It is a logic of belief, with special constructs for expressing some of the central concepts used in authentication. The logic has revealed many subt Ieties and serious errors in published protocols.  ...  What kinds of properties of authentication protocols is the logic designed to study?  ... 
doi:10.1145/112600.112618 dblp:conf/podc/AbadiT91 fatcat:w2djaelwzjecpgjelzdjotemha

Authenticity: a red herring?

J.E.P. Currall, M.S. Moss, S.A.J. Stuart
2008 Journal of Applied Logic  
We are convinced that only by adopting such a stance can any progress be made in the sterile debate about digital preservation which logically must be downstream from the resolution of notions of authenticity  ...  Authenticity is a difficult and taxing notion in both the digital and the analogue world.  ...  Acknowledgement The authors are very grateful for the input of Dr.  ... 
doi:10.1016/j.jal.2008.09.004 fatcat:ramv5tarxne4dl5f57coimd7qy

Authentication of RSA via BAN logic

Israa N.A. Alsalhi, Salah A. K. Albermany
2019 Journal of Kufa for Mathematics and Computer  
In this paper, we are using analysis authentication protocol of RSA algorithm by BAN logic also It using C# programing .  ...  Authentication is the basis of security in such systems.  ...  The logic of authentication refers to the logical calculus which is based on an accepted set of deduction rules for formal reasoning on authentication protocols.  ... 
doi:10.31642/jokmc/2018/060101 fatcat:q6siue73graklc7wukpuy7jm7e

Multilingualism, Divergent Authentic Versions of a Legal Rule and Legitimate Expectations Of Individuals

Rafał Mańko
2016 Studies in Logic, Grammar and Rhetoric  
In case of discrepancies of equally authentic versions, individuals should have the possibility to rely on an 'authentic version' defence, especially in tax, customs and criminal law relationships.  ...  The paper argues that the multilingualism of the EU legal order should be viewed from the point of view of the right of individuals to acquaint themselves with the their rights and duties under EU law  ...  is expressed in 9 authentic languages is a logical consequence of the equal authenticity of those languages.  ... 
doi:10.1515/slgr-2016-0021 fatcat:ydtaubch7fbypfwvl6ttvbda4i


Israa N. Alsalhi, Kufa University, Najaf, Iraq, Salah A. Albermany
2019 Azerbaijan Journal of High Performance Computing  
We are using authentication of the ElGamal algorithm and analysis via BAN logic to show if it is achieving the authentication and secure communication to be used in CRN.  ...  Despite the different methods of protection used in CRNs, they may be exposed to external attacks and to provide security, we will have a high-security protocol analysis using BAN logic.  ...  The original messages of authentication phase are representing as follow:  ... 
doi:10.32010/26166127.2019. fatcat:5wyg4p7earcbdlp5mpg3e3fdgq

Automated Proof of Authentication Protocols in a Logic of Events

Mark Bickford
use of a well-founded causal ordering on events.This work shows that proofs in a logic like PCL can be automated, provides a new and possibly simpler axiomatization for a theory of authentication, and  ...  Using the language of event orderings and event classes, and using a type of atoms to represent nonces, keys, signatures, and ciphertexts, we give an axiomatization of a theory in which authentication  ...  Overview Section 3 is a self-contained description of Authentication Event Logic.  ... 
doi:10.29007/r7n1 fatcat:ibt26gnccbhinhxupji44saqny

Anti-counterfeit Authentication System of Printed Information Based on A Logic Signing Tehinique

CAO Sheng, Chen Zheng, Sun Xuandong
2007 Proceedings on Intelligent Systems and Knowledge Engineering (ISKE2007)   unpublished
PMI is bestowed to resolve the issue of management of crpto-keys as a convincing complementarity for the authentication system based on the logic signing technique.  ...  To protect printed information from being forged, tampered with or misappropriated, a logic signing technique was developed, which was applied to anti-counterfeit authentication system so as to intelligently  ...  The authentication mechanism utilizes the logic signing technique to protect synthetic information on a certificate.  ... 
doi:10.2991/iske.2007.213 fatcat:gqwcp7ywzfe4bmcnemzxhsr7ie

Requirements for preventing logic flaws in the authentication procedure of web applications

Youssou Ndiaye, Olivier Barais, Arnaud Blouin, Ahmed Bouabdallah, Nicolas Aillery
2019 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing - SAC '19  
Another kind of flaws that affect web applications are logic flaws, but they lack of considerations.  ...  KEYWORDS Web-based authentication, human behavior, logic flaws, security requirements, usability requirements.  ...  We extended the OWASP Foundation's definition of a logic flaw [13] to the context of the authentication of the web-based applications, and provide the following definition: Logic flaws are ways of using  ... 
doi:10.1145/3297280.3297438 dblp:conf/sac/NdiayeBBBA19 fatcat:wia7nxkjd5grvkrvy5ew3b7h2e

Research on Identity Authentication Method Based on Negative Logic System [chapter]

Yexia Cheng, Yuejin Du, Jin Peng, Jun Fu, Baoxu Liu
2019 Communications in Computer and Information Science  
The identity authentication is a must for these services. To solve the problem, identity authentication system and method based on negative logic system (NLS) is proposed in the paper.  ...  With the rapid development of computer and network, new technologies and services such as mobile Internet, Internet of Things, cloud and artificial intelligence have arisen and changed people's life.  ...  This work is supported by the National Natural Science Foundation of China (No. 61702508 and No. 61602470) and Strategic Priority Research Program of Chinese Academy of Sciences.  ... 
doi:10.1007/978-981-13-6621-5_1 fatcat:c3rzrnyb45bpbnedrzfo7owddu

Institutional Complexity and the Authenticity of Corporate Social Responsibility Initiatives

Paul F Skilton, Jill M. Purdy
2014 Academy of Management Proceedings  
Observer self-interest, which fits with a logic of consequence, is a necessary element of our theory.  ...  A major difficulty with the current approach to authenticity is the absence of a discussion of the social construction of beliefs and facts.  ... 
doi:10.5465/ambpp.2014.137 fatcat:w7mqhrmuajb3xes24fj76lyl3e

On the Properties of Epistemic and Temporal Epistemic Logics of Authentication

Sharar Ahmadi, Mehran S. Fallah, Massoud Pourmahdian
2019 Informatica (Ljubljana, Tiskana izd.)  
The authentication properties of a security protocol are specified based on the knowledge gained by the principals that exchange messages with respect to the steps of that protocol.  ...  The aim of this paper is to provide an overview of the epistemic and temporal epistemic logics which are applied in the analysis of authentication protocols to find out how far these logical properties  ...  A Kripke model of an epistemic logic of authentication can reflect an authentication protocol.  ... 
doi:10.31449/inf.v43i2.1617 fatcat:qbazeyld5zc5vd6lrajugisj3q
« Previous Showing results 1 — 15 out of 221,040 results