Filters








24,915 Hits in 6.1 sec

A semantics for a logic of authentication (extended abstract)

Martín Abadi, Mark R. Tuttle
1991 Proceedings of the tenth annual ACM symposium on Principles of distributed computing - PODC '91  
Burrows, Abadi, and Needham have proposed a logic for the analysis of authentication protocols.  ...  It is a logic of belief, with special constructs for expressing some of the central concepts used in authentication. The logic has revealed many subt Ieties and serious errors in published protocols.  ...  The next step is to relax this assumption and extend the logic and semantics to consider the effects of cryptographic insecurities on authentication protocols.  ... 
doi:10.1145/112600.112618 dblp:conf/podc/AbadiT91 fatcat:w2djaelwzjecpgjelzdjotemha

An Epistemic Foundation for Authentication Logics (Extended Abstract)

Joseph Y. Halpern, Ron van der Meyden, Riccardo Pucella
2017 Electronic Proceedings in Theoretical Computer Science  
We demonstrate that our logic can capture BAN logic notions by providing a translation of the BAN operators into our logic, capturing belief by a form of probabilistic knowledge.  ...  Moreover, while still assuming that the knowledge operator allows for unbounded computation, it can handle the fact that a computationally bounded agent cannot decrypt messages in a natural way, by distinguishing  ...  Acknowledgements We thank the TARK reviewers for their insightful comments.  ... 
doi:10.4204/eptcs.251.21 fatcat:ek73m32q5beotnms4oa42yhwa4

Representation independence, confinement and access control [extended abstract]

Anindya Banerjee, David A. Naumann
2002 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '02  
Representation independence (relational parametricity) is proved, using a semantic notion of confinement similar to ones for which static disciplines have been recently proposed.  ...  Denotational semantics is given for a Java-like language with pointers, subclassing and dynamic dispatch, class oriented visibility control, recursive types and methods, and privilegebased access control  ...  Hongseok Yang pointed out a faulty proof step, which led us to correct the definition of confinement.  ... 
doi:10.1145/503272.503289 dblp:conf/popl/BanerjeeN02 fatcat:iyoqa2r7cnhfvhzaeehpmaglee

Representation independence, confinement and access control [extended abstract]

Anindya Banerjee, David A. Naumann
2002 SIGPLAN notices  
Representation independence (relational parametricity) is proved, using a semantic notion of confinement similar to ones for which static disciplines have been recently proposed.  ...  Denotational semantics is given for a Java-like language with pointers, subclassing and dynamic dispatch, class oriented visibility control, recursive types and methods, and privilegebased access control  ...  Hongseok Yang pointed out a faulty proof step, which led us to correct the definition of confinement.  ... 
doi:10.1145/565816.503289 fatcat:c4z3adsjcvbslfywlwxwkzafze

A Sorted Semantic Framework for Applied Process Calculi (Extended Abstract) [chapter]

Johannes Borgström, Ramūnas Gutkovas, Joachim Parrow, Björn Victor, Johannes Åman Pohjola
2014 Lecture Notes in Computer Science  
To this end, we extend our previous work on psi-calculi with novel abstract patterns and pattern matching, and add sorts to the data term language, giving sufficient criteria for subject reduction to hold  ...  Our goal is a unified framework to represent different process calculi and notions of computation.  ...  [10] add a general authentication logic to a process calculus with destructor matching; the authentication logic is only used to specify program correctness, and do not influence the operational semantics  ... 
doi:10.1007/978-3-319-14128-2_7 fatcat:3iz7ilyzz5ch7dsawbd5qtqgae

A Sorted Semantic Framework for Applied Process Calculi (Extended Abstract) [chapter]

Johannes Borgström, Ramūnas Gutkovas, Joachim Parrow, Björn Victor, Johannes Åman Pohjola
2014 Lecture Notes in Computer Science  
To this end, we extend our previous work on psi-calculi with novel abstract patterns and pattern matching, and add sorts to the data term language, giving sufficient criteria for subject reduction to hold  ...  Our goal is a unified framework to represent different process calculi and notions of computation.  ...  [10] add a general authentication logic to a process calculus with destructor matching; the authentication logic is only used to specify program correctness, and do not influence the operational semantics  ... 
doi:10.1007/978-3-319-05119-2_7 fatcat:fpfn3m6zmbdq5ixi5btoo7lm6a

Innovation and Global Issues 1: Extended Abstracts Book [article]

Nurettin Bilici, Ragıp Pehlivanlı, Selçuk Demirkılınç
2021 figshare.com  
It is a valuable academic work that contains extended abstracts of the academic studies presented within the scope of Innovation and Global Issues Congress I in Patara Antique city by InGlobe Academy and  ...  The final scale of the scale, originally 14-degrees, has been converted to a five-point Likert-type scale (Sherer and Adams 1983).  ...  who are studying Pedagogical Formation in Faculty of Education on attitude and motivation of self-efficacy.  ... 
doi:10.6084/m9.figshare.13634555.v3 fatcat:nlekic2mu5cmze3ad5dn6jorzq

Innovation and Global Issues 1: Extended Abstracts Book [article]

Nurettin Bilici, Ragıp Pehlivanlı, Selçuk Demirkılınç
2021 figshare.com  
A design made at one end of the world affects the consumer in a very different region.  ...  Each piece that has produced in different countries and finally brought together to generate a product for market in global system.  ...  Işıl ALKAN 1 Extended Abstract Introduction Hazelnut is the one of most strategical crops for Turkey as the country is responsible for about seventy percent of world's hazelnut trade and two-thirds  ... 
doi:10.6084/m9.figshare.13634555.v1 fatcat:q5mkgjq3jrh5jn4ualb2pshj5u

Grand challenges: companies and universities working for a better society (Extended Abstracts)

MARTA UGOLINI
2021 Sinergie Italian Journal of Management  
Gli Extended Abstract racconti in questo volume affrontano la tematica con una varietà di argomenti, punti di vista, prospettive.  ...  Le società contemporanee si trovano di fronte a un bivio: da un lato i governi sono sotto pressione per raggiungere obiettivi ambiziosi di crescita economica, dall'altro tale crescita alimenta complesse  ...  ., JONKER J. (2018), "Embracing the variety of sustainable business models: A prolific field of research and a future research agenda", Journal of cleaner production, vol. 194, pp. 695-703.  ... 
doi:10.7433/srecp.ea.2020.01 fatcat:7tu5ulmovbauzc744x5nxjx2by

Transference of dance knowledge through interface design

Natalie Ebenreuter
2006 CHI '06 extended abstracts on Human factors in computing systems - CHI EA '06  
This research proceeds on the basis that the integration of an operational structure for the documentation of movement within the prototype application LabanAssist can ensure that the correct syntax of  ...  The integration of technology into the arts motivated the development of complex computer applications that supply artists with a greater means of creative expression (Assey, 2005).  ...  of the conventional or semantic construction of a symbolic language as the context for its use (Burke, 1969a) .  ... 
doi:10.1145/1125451.1125777 dblp:conf/chi/Ebenreuter06 fatcat:2ghx2ft6urfmjkw2gwylqoor4m

Page 4635 of Mathematical Reviews Vol. , Issue 2003f [page]

2003 Mathematical Reviews  
The authors of the present paper extend the z-calculus and the spi-calculus, used for modeling concurrent and mobile agents, with two primitives that guarantee authentication.  ...  After a quick introduction to Petri nets and linear logics, the author first shows how to encode a class of P/T nets extended with disposable transitions into an adequate fragment of the in- tuitionistic  ... 

On the Properties of Epistemic and Temporal Epistemic Logics of Authentication

Sharar Ahmadi, Mehran S. Fallah, Massoud Pourmahdian
2019 Informatica (Ljubljana, Tiskana izd.)  
The authentication properties of a security protocol are specified based on the knowledge gained by the principals that exchange messages with respect to the steps of that protocol.  ...  The aim of this paper is to provide an overview of the epistemic and temporal epistemic logics which are applied in the analysis of authentication protocols to find out how far these logical properties  ...  This can build a foundation for constructing Kripke semantics for epistemic logics of authentication as follows [26] .  ... 
doi:10.31449/inf.v43i2.1617 fatcat:qbazeyld5zc5vd6lrajugisj3q

Preface

Cesare Tinelli, Teodor Rus
2003 Theoretical Computer Science  
Mejri describes a modal logic in the dynamic logic family that is particularly well-suited for specifying and proving properties of protocols for electronic commerce.  ...  Only papers with positive reviews were accepted for ÿnal publication. Here follows a brief description of the accepted papers. 1. A New Logic for Electronic Commerce Protocols by K. Adi, M.  ...  The logic is endowed with a sound and complete tableau-based inference system for verifying whether a given protocol trace satisÿes a formula. 2. A comparison of three authentication properties by R.  ... 
doi:10.1016/s0304-3975(02)00363-8 fatcat:pyvmpb5vjjbxfd35g33o3hdfhq

Page 5680 of Mathematical Reviews Vol. , Issue 99h [page]

1999 Mathematical Reviews  
Galmiche, Provability in intuitionistic linear logic from a new in- terpretation on Petri nets—extended abstract (18 pp. (electronic));  ...  Mills, Cryptographic authentication for real-time network protocols (135-144); Shmuel Zaks, Path layout in ATM networks—a survey (145-160).  ... 

Formal Modelling of Network Security Properties (Extended Abstract)

Gyesik Lee
2013 Interdisciplinary Research Theory and Technology   unpublished
Given a language, terms are defined inductively. If t 1 and t 2 are terms, (t 1 , t 2 ) stands for composition of pairs and {t 1 } t2 for encryption of t 1 by using t 2 .  ...  Formal Model-ling of Network Security Properties 3 as nonces and session keys, a set R of role name symbols, a set F of function symbols for such as global constants or hash functions.  ...  A formal method is based on a combination of a mathematical or logical model of a system and its requirements.  ... 
doi:10.14257/astl.2013.29.05 fatcat:mimb6kjvcrd6zlarml26kkrxle
« Previous Showing results 1 — 15 out of 24,915 results