Model checking is a very successful technique which has been applied in the design and verification of finite state concurrent reactive processes. In this paper we show how this technique can be used for the verification of security protocols using a logic of belief. The underlying idea is to treat separately the temporal evolution and the belief aspects of principals. In practice, things work as follows: when we consider the temporal evolution of a principal we treat belief atoms (namely, atomic formulae expressing belief) as atomic propositions. When we deal with the beliefs of a principal A, we model its beliefs about another principal B as the fact that A has access to a representation of B as a process. Then, any time it needs to verif...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
In this paper we present a unified framework to model and verify degrees of belief in a system of age...
Trust is a critical issue for communication protocols in open systems that operate in dynamic and hi...
In this paper we show how model checking can be used for the verification of security protocols usin...
Abstract. Analysis methods for cryptographic protocols have often focused on information leakage rat...
Cryptographic protocols are structured sequences of mes-sages that are used for exchanging informati...
Cryptographic protocols are structured sequences of mes-sages that are used for exchanging informati...
Abstract. Model checking as an approach to the automatic verification of finite state systems has fo...
When designing a cryptographic protocol or explaining it, one often uses arguments such as "since th...
To develop theories to specify and reason about various aspects of multi-agent systems, many researc...
AbstractModel checking is a well-established technique for the formal verification of concurrent and...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Knowledge-based programs provide an abstract level of description of protocols in which agent action...
The goal of an authentication system is to verify and authorise users, in order to protect restricte...
Protocols in electronic commerce and other securitysensitive applications require careful reasoning ...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
In this paper we present a unified framework to model and verify degrees of belief in a system of age...
Trust is a critical issue for communication protocols in open systems that operate in dynamic and hi...
In this paper we show how model checking can be used for the verification of security protocols usin...
Abstract. Analysis methods for cryptographic protocols have often focused on information leakage rat...
Cryptographic protocols are structured sequences of mes-sages that are used for exchanging informati...
Cryptographic protocols are structured sequences of mes-sages that are used for exchanging informati...
Abstract. Model checking as an approach to the automatic verification of finite state systems has fo...
When designing a cryptographic protocol or explaining it, one often uses arguments such as "since th...
To develop theories to specify and reason about various aspects of multi-agent systems, many researc...
AbstractModel checking is a well-established technique for the formal verification of concurrent and...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Knowledge-based programs provide an abstract level of description of protocols in which agent action...
The goal of an authentication system is to verify and authorise users, in order to protect restricte...
Protocols in electronic commerce and other securitysensitive applications require careful reasoning ...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
In this paper we present a unified framework to model and verify degrees of belief in a system of age...
Trust is a critical issue for communication protocols in open systems that operate in dynamic and hi...