Intruder deducibility constraints with negation. Decidability and application to secured service compositions (Q507348): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(7 intermediate revisions by 5 users not shown)
Property / author
 
Property / author: Michaël Rusinowitch / rank
Normal rank
 
Property / author
 
Property / author: Michaël Rusinowitch / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 68M11 / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 68P25 / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A60 / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A62 / rank
 
Normal rank
Property / zbMATH DE Number
 
Property / zbMATH DE Number: 6680822 / rank
 
Normal rank
Property / zbMATH Keywords
 
web services
Property / zbMATH Keywords: web services / rank
 
Normal rank
Property / zbMATH Keywords
 
orchestration
Property / zbMATH Keywords: orchestration / rank
 
Normal rank
Property / zbMATH Keywords
 
security policy
Property / zbMATH Keywords: security policy / rank
 
Normal rank
Property / zbMATH Keywords
 
separation of duty
Property / zbMATH Keywords: separation of duty / rank
 
Normal rank
Property / zbMATH Keywords
 
deducibility constraints
Property / zbMATH Keywords: deducibility constraints / rank
 
Normal rank
Property / zbMATH Keywords
 
cryptographic protocols
Property / zbMATH Keywords: cryptographic protocols / rank
 
Normal rank
Property / zbMATH Keywords
 
formal methods
Property / zbMATH Keywords: formal methods / rank
 
Normal rank
Property / zbMATH Keywords
 
automated verification
Property / zbMATH Keywords: automated verification / rank
 
Normal rank
Property / zbMATH Keywords
 
synthesis
Property / zbMATH Keywords: synthesis / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2132938106 / rank
 
Normal rank
Property / arXiv ID
 
Property / arXiv ID: 1207.4871 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deciding knowledge in security protocols under equational theories / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deciding security properties for cryptographic protocols. application to key cycles / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: A logic of trust and reputation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trust and Norms in the Context of Computer Security: A Logical Formalization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2848034 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards an Integrated Formal Analysis for Security and Trust / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic recognition of tractability in inference relations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank
 
Normal rank
Property / cites work
 
Property / cites work: The CL-Atse Protocol Analyser / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 08:54, 13 July 2024

scientific article
Language Label Description Also known as
English
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
scientific article

    Statements

    Intruder deducibility constraints with negation. Decidability and application to secured service compositions (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    6 February 2017
    0 references
    web services
    0 references
    orchestration
    0 references
    security policy
    0 references
    separation of duty
    0 references
    deducibility constraints
    0 references
    cryptographic protocols
    0 references
    formal methods
    0 references
    automated verification
    0 references
    synthesis
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references