Intruder deducibility constraints with negation. Decidability and application to secured service compositions
DOI10.1016/J.JSC.2016.07.008zbMATH Open1356.68012arXiv1207.4871OpenAlexW2132938106MaRDI QIDQ507348FDOQ507348
Authors: Tigran Avanesov, Yannick Chevalier, Mathieu Turuani, Michaël Rusinowitch
Publication date: 6 February 2017
Published in: Journal of Symbolic Computation (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1207.4871
Recommendations
synthesisformal methodsautomated verificationcryptographic protocolsweb servicesorchestrationsecurity policydeducibility constraintsseparation of duty
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Internet topics (68M11) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Automatic recognition of tractability in inference relations
- Deciding knowledge in security protocols under equational theories
- On the security of public key protocols
- A logic of trust and reputation
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
- Deciding security properties for cryptographic protocols. application to key cycles
- On the relative soundness of the free algebra model for public key encryption
- Trust and Norms in the Context of Computer Security: A Logical Formalization
- The CL-Atse Protocol Analyser
- Towards an Integrated Formal Analysis for Security and Trust
Cited In (2)
This page was built for publication: Intruder deducibility constraints with negation. Decidability and application to secured service compositions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q507348)