AbstractIn this paper we extend the results proposed in [5] so as to provide an approach for finding and using a safe abstraction for the verification of general security properties. Similar abstractions based on abstract interpretation techniques have been developed for the verification of temporal properties expressed using various branching-time temporal logics (eg. [10,8,15,9,13,14,19]). Here we transpose some of the results of [8,14,19] to the verification of security properties. We also automate the construction of the abstract model and the translation of security properties into abstract ones for a large class of practical situations. As opposed to other uses of abstraction which typically guarantee the preservation of a whole logic...
We consider machine-aided verification of suitably constructed abstractions of security protocols, ...
The distributed temporal logic DTL is an expressive logic, well-suited for formalizing properties of...
Recently there has been much interest towards using formal methods in the analysis of security proto...
Abstract — Given its special nature, e-commerce yields concerns for providing secure transactions. A...
We present a large class of security protocol abstractions with the aim of improving the scope and e...
We present a large class of security protocol abstractions with the aim of improving the scope and e...
Abstract. Safety critical and business critical systems are usually controlled by policies with the ...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
This paper presents a novel approach for concisely abstracting authentication protocols and for subs...
AbstractA cryptographic protocol is a distributed program that can be executed by several actors. Si...
Running critical applications, such as e-commerce, in a distributed environment requires assurance o...
AbstractThe distributed temporal logic DTL is an expressive logic, well suited for formalizing prope...
AbstractTemporal logics of knowledge are useful for reasoning about situations where the knowledge o...
The distributed temporal logic DTL is an expressive logic, well suited for formalizing properties of...
Security protocols are one of the imperative steps in creating and ensuring the secure communication...
We consider machine-aided verification of suitably constructed abstractions of security protocols, ...
The distributed temporal logic DTL is an expressive logic, well-suited for formalizing properties of...
Recently there has been much interest towards using formal methods in the analysis of security proto...
Abstract — Given its special nature, e-commerce yields concerns for providing secure transactions. A...
We present a large class of security protocol abstractions with the aim of improving the scope and e...
We present a large class of security protocol abstractions with the aim of improving the scope and e...
Abstract. Safety critical and business critical systems are usually controlled by policies with the ...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
This paper presents a novel approach for concisely abstracting authentication protocols and for subs...
AbstractA cryptographic protocol is a distributed program that can be executed by several actors. Si...
Running critical applications, such as e-commerce, in a distributed environment requires assurance o...
AbstractThe distributed temporal logic DTL is an expressive logic, well suited for formalizing prope...
AbstractTemporal logics of knowledge are useful for reasoning about situations where the knowledge o...
The distributed temporal logic DTL is an expressive logic, well suited for formalizing properties of...
Security protocols are one of the imperative steps in creating and ensuring the secure communication...
We consider machine-aided verification of suitably constructed abstractions of security protocols, ...
The distributed temporal logic DTL is an expressive logic, well-suited for formalizing properties of...
Recently there has been much interest towards using formal methods in the analysis of security proto...