Sciweavers

CSFW
1999
IEEE
13 years 8 months ago
Mixed Strand Spaces
Strand space analysis [13, 12] is a method for stating and proving correctness properties for cryptographic protocols. In this paper we apply the same method to the related proble...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
CSFW
1999
IEEE
13 years 8 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
CSFW
1999
IEEE
13 years 8 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
CSFW
1999
IEEE
13 years 8 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
CSFW
1999
IEEE
13 years 8 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
CSFW
1999
IEEE
13 years 8 months ago
What Is Intransitive Noninterference?
The term "intransitive noninterference" refers to the information flow properties required of systems like downgraders, in which it may be legitimate for information to ...
A. W. Roscoe, M. H. Goldsmith
CSFW
1999
IEEE
13 years 8 months ago
A Logic-based Knowledge Representation for Authorization with Delegation
Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof
CSFW
1999
IEEE
13 years 8 months ago
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In addition to the familiar BAN logic, it is also applicab...
David Monniaux
CSFW
1999
IEEE
13 years 8 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
CSFW
1999
IEEE
13 years 8 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...