Intruder deducibility constraints with negation. Decidability and application to secured service compositions (Q507348): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Deciding knowledge in security protocols under equational theories / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deciding security properties for cryptographic protocols. application to key cycles / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: A logic of trust and reputation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trust and Norms in the Context of Computer Security: A Logical Formalization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2848034 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards an Integrated Formal Analysis for Security and Trust / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic recognition of tractability in inference relations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank
 
Normal rank
Property / cites work
 
Property / cites work: The CL-Atse Protocol Analyser / rank
 
Normal rank

Latest revision as of 08:54, 13 July 2024

scientific article
Language Label Description Also known as
English
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
scientific article

    Statements

    Intruder deducibility constraints with negation. Decidability and application to secured service compositions (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    6 February 2017
    0 references
    web services
    0 references
    orchestration
    0 references
    security policy
    0 references
    separation of duty
    0 references
    deducibility constraints
    0 references
    cryptographic protocols
    0 references
    formal methods
    0 references
    automated verification
    0 references
    synthesis
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references