A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A semantics for a logic of authentication (extended abstract)
1991
Proceedings of the tenth annual ACM symposium on Principles of distributed computing - PODC '91
Burrows, Abadi, and Needham have proposed a logic for the analysis of authentication protocols. ...
It is a logic of belief, with special constructs for expressing some of the central concepts used in authentication. The logic has revealed many subt Ieties and serious errors in published protocols. ...
The next step is to relax this assumption and extend the logic and semantics to consider the effects of cryptographic insecurities on authentication protocols. ...
doi:10.1145/112600.112618
dblp:conf/podc/AbadiT91
fatcat:w2djaelwzjecpgjelzdjotemha
An Epistemic Foundation for Authentication Logics (Extended Abstract)
2017
Electronic Proceedings in Theoretical Computer Science
We demonstrate that our logic can capture BAN logic notions by providing a translation of the BAN operators into our logic, capturing belief by a form of probabilistic knowledge. ...
Moreover, while still assuming that the knowledge operator allows for unbounded computation, it can handle the fact that a computationally bounded agent cannot decrypt messages in a natural way, by distinguishing ...
Acknowledgements We thank the TARK reviewers for their insightful comments. ...
doi:10.4204/eptcs.251.21
fatcat:ek73m32q5beotnms4oa42yhwa4
Representation independence, confinement and access control [extended abstract]
2002
Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '02
Representation independence (relational parametricity) is proved, using a semantic notion of confinement similar to ones for which static disciplines have been recently proposed. ...
Denotational semantics is given for a Java-like language with pointers, subclassing and dynamic dispatch, class oriented visibility control, recursive types and methods, and privilegebased access control ...
Hongseok Yang pointed out a faulty proof step, which led us to correct the definition of confinement. ...
doi:10.1145/503272.503289
dblp:conf/popl/BanerjeeN02
fatcat:iyoqa2r7cnhfvhzaeehpmaglee
Representation independence, confinement and access control [extended abstract]
2002
SIGPLAN notices
Representation independence (relational parametricity) is proved, using a semantic notion of confinement similar to ones for which static disciplines have been recently proposed. ...
Denotational semantics is given for a Java-like language with pointers, subclassing and dynamic dispatch, class oriented visibility control, recursive types and methods, and privilegebased access control ...
Hongseok Yang pointed out a faulty proof step, which led us to correct the definition of confinement. ...
doi:10.1145/565816.503289
fatcat:c4z3adsjcvbslfywlwxwkzafze
A Sorted Semantic Framework for Applied Process Calculi (Extended Abstract)
[chapter]
2014
Lecture Notes in Computer Science
To this end, we extend our previous work on psi-calculi with novel abstract patterns and pattern matching, and add sorts to the data term language, giving sufficient criteria for subject reduction to hold ...
Our goal is a unified framework to represent different process calculi and notions of computation. ...
[10] add a general authentication logic to a process calculus with destructor matching; the authentication logic is only used to specify program correctness, and do not influence the operational semantics ...
doi:10.1007/978-3-319-14128-2_7
fatcat:3iz7ilyzz5ch7dsawbd5qtqgae
A Sorted Semantic Framework for Applied Process Calculi (Extended Abstract)
[chapter]
2014
Lecture Notes in Computer Science
To this end, we extend our previous work on psi-calculi with novel abstract patterns and pattern matching, and add sorts to the data term language, giving sufficient criteria for subject reduction to hold ...
Our goal is a unified framework to represent different process calculi and notions of computation. ...
[10] add a general authentication logic to a process calculus with destructor matching; the authentication logic is only used to specify program correctness, and do not influence the operational semantics ...
doi:10.1007/978-3-319-05119-2_7
fatcat:fpfn3m6zmbdq5ixi5btoo7lm6a
Innovation and Global Issues 1: Extended Abstracts Book
[article]
2021
figshare.com
It is a valuable academic work that contains extended abstracts of the academic studies presented within the scope of Innovation and Global Issues Congress I in Patara Antique city by InGlobe Academy and ...
The final scale of the scale, originally 14-degrees, has been converted to a five-point Likert-type scale (Sherer and Adams 1983). ...
who are studying Pedagogical Formation in Faculty of Education on attitude and motivation of self-efficacy. ...
doi:10.6084/m9.figshare.13634555.v3
fatcat:nlekic2mu5cmze3ad5dn6jorzq
Innovation and Global Issues 1: Extended Abstracts Book
[article]
2021
figshare.com
A design made at one end of the world affects the consumer in a very different region. ...
Each piece that has produced in different countries and finally brought together to generate a product for market in global system. ...
Işıl ALKAN 1 Extended Abstract
Introduction Hazelnut is the one of most strategical crops for Turkey as the country is responsible for about seventy percent of world's hazelnut trade and two-thirds ...
doi:10.6084/m9.figshare.13634555.v1
fatcat:q5mkgjq3jrh5jn4ualb2pshj5u
Grand challenges: companies and universities working for a better society (Extended Abstracts)
2021
Sinergie Italian Journal of Management
Gli Extended Abstract racconti in questo volume affrontano la tematica con una varietà di argomenti, punti di vista, prospettive. ...
Le società contemporanee si trovano di fronte a un bivio: da un lato i governi sono sotto pressione per raggiungere obiettivi ambiziosi di crescita economica, dall'altro tale crescita alimenta complesse ...
., JONKER J. (2018), "Embracing the variety of sustainable business models: A prolific field of research and a future research agenda", Journal of cleaner production, vol. 194, pp. 695-703. ...
doi:10.7433/srecp.ea.2020.01
fatcat:7tu5ulmovbauzc744x5nxjx2by
Transference of dance knowledge through interface design
2006
CHI '06 extended abstracts on Human factors in computing systems - CHI EA '06
This research proceeds on the basis that the integration of an operational structure for the documentation of movement within the prototype application LabanAssist can ensure that the correct syntax of ...
The integration of technology into the arts motivated the development of complex computer applications that supply artists with a greater means of creative expression (Assey, 2005). ...
of the conventional or semantic construction of a symbolic language as the context for its use (Burke, 1969a) . ...
doi:10.1145/1125451.1125777
dblp:conf/chi/Ebenreuter06
fatcat:2ghx2ft6urfmjkw2gwylqoor4m
Page 4635 of Mathematical Reviews Vol. , Issue 2003f
[page]
2003
Mathematical Reviews
The authors of the present paper extend the z-calculus and the spi-calculus, used for modeling concurrent and mobile agents, with two primitives that guarantee authentication. ...
After a quick introduction to Petri nets and linear logics, the author first shows how to encode a class of P/T nets extended with disposable transitions into an adequate fragment of the in- tuitionistic ...
On the Properties of Epistemic and Temporal Epistemic Logics of Authentication
2019
Informatica (Ljubljana, Tiskana izd.)
The authentication properties of a security protocol are specified based on the knowledge gained by the principals that exchange messages with respect to the steps of that protocol. ...
The aim of this paper is to provide an overview of the epistemic and temporal epistemic logics which are applied in the analysis of authentication protocols to find out how far these logical properties ...
This can build a foundation for constructing Kripke semantics for epistemic logics of authentication as follows [26] . ...
doi:10.31449/inf.v43i2.1617
fatcat:qbazeyld5zc5vd6lrajugisj3q
Preface
2003
Theoretical Computer Science
Mejri describes a modal logic in the dynamic logic family that is particularly well-suited for specifying and proving properties of protocols for electronic commerce. ...
Only papers with positive reviews were accepted for ÿnal publication. Here follows a brief description of the accepted papers. 1. A New Logic for Electronic Commerce Protocols by K. Adi, M. ...
The logic is endowed with a sound and complete tableau-based inference system for verifying whether a given protocol trace satisÿes a formula. 2. A comparison of three authentication properties by R. ...
doi:10.1016/s0304-3975(02)00363-8
fatcat:pyvmpb5vjjbxfd35g33o3hdfhq
Page 5680 of Mathematical Reviews Vol. , Issue 99h
[page]
1999
Mathematical Reviews
Galmiche, Provability in intuitionistic linear logic from a new in- terpretation on Petri nets—extended abstract (18 pp. (electronic)); ...
Mills, Cryptographic authentication for real-time network protocols (135-144); Shmuel Zaks, Path layout in ATM networks—a survey (145-160). ...
Formal Modelling of Network Security Properties (Extended Abstract)
2013
Interdisciplinary Research Theory and Technology
unpublished
Given a language, terms are defined inductively. If t 1 and t 2 are terms, (t 1 , t 2 ) stands for composition of pairs and {t 1 } t2 for encryption of t 1 by using t 2 . ...
Formal Model-ling of Network Security Properties 3 as nonces and session keys, a set R of role name symbols, a set F of function symbols for such as global constants or hash functions. ...
A formal method is based on a combination of a mathematical or logical model of a system and its requirements. ...
doi:10.14257/astl.2013.29.05
fatcat:mimb6kjvcrd6zlarml26kkrxle
« Previous
Showing results 1 — 15 out of 24,915 results