Results 1 - 10
of
1,837
A Novel Approach to the Automation of Logic-Based Security Protocol Verification
- WSEAS Transactions on Information Science and Applications
, 2004
"... Abstract:- Secure communications over insecure networks relies on the security of cryptographic protocols. Formal verification is an essential step in the design of security protocols. In particular logic-based verification has been shown to be effective and has discovered a number of protocol flaws ..."
Abstract
-
Cited by 5 (5 self)
- Add to MetaCart
Abstract:- Secure communications over insecure networks relies on the security of cryptographic protocols. Formal verification is an essential step in the design of security protocols. In particular logic-based verification has been shown to be effective and has discovered a number of protocol
The Concept of Layered Proving Trees and Its Application to the Automation of Security Protocol Verification
- ACM Transactions on Information and System Security
, 2005
"... Security protocols are one of the most critical elements in enabling the secure communication and processing of information. The presence of flaws in published protocols highlights the complexity of security protocol design. Only formal verification can provide strong confidence in the correctness o ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
of security protocols and is considered an imperative step in their design. This paper presents a new theoretical concept, called Layered Proving Trees, for automatically applying logical postulates in logic-based security protocol verification. An algorithm for the new concept is introduced and the soundness
Extending CAPSL for Logic-Based Verifications
"... Abstract:- Cryptographic protocols are designed to provide security services, such as key distribution, authentication and non-repudiation, over insecure networks. The design process of cryptographic protocols is highly complex. In particular, the translation from the informal protocol description t ..."
Abstract
- Add to MetaCart
to the formal protocol specification is an error-prone step, as the exact meaning of the requirements of the security protocol need to be conveyed. This paper presents a case study on extending the Common Authentication Protocol Specification Language (CAPSL) to enable it to be used with logic-based formal
Secure Verification of Location claims
- In Proceedings of the ACM Workshop on Wireless Security (WiSe
, 2003
"... With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method ..."
Abstract
-
Cited by 291 (1 self)
- Add to MetaCart
With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple
A Computational Logic-based approach to security protocols verification, and its application to the Needham-Schroeder Public Key authentication protocol
"... Abstract. In this work we present a proof-theoretic approach to the verification of security protocols. Starting from the perspective of open multi-agent systems, where the internal architecture of the individual system’s components may not be completely specified but it is important to infer and pr ..."
Abstract
- Add to MetaCart
and prove properties about the overall system behaviour, we propose a general framework where several kinds of verification can be applied. We take a formal approach based on Computational Logic, to tackle verification at two orthogonal levels: ‘static ’ verification of protocol properties, and ‘dynamic
Specification and Verification of Agent Interaction Protocols in a Logic-based System
- PROCEEDINGS OF THE 2004 ACM SYMPOSIUM ON APPLIED COMPUTING (SAC)
, 2004
"... In multiagent systems, agent interaction is ruled by means of interaction protocols. Compliance to protocols can be hardwired in agent programs; however, this requires that only “certified ” agents interact. In open societies, composed of autonomous and heterogeneous agents whose internal structure ..."
Abstract
-
Cited by 50 (9 self)
- Add to MetaCart
in a logic-based formalism (Social Integrity Constraints). We also present the application of the formalism and the system to the specification and verification of the FIPA Contract-Net protocol.
Automated Verification of Security Protocols
, 2002
"... In this paper we investigate the applicability of a bottom-up evaluation strategy for a first order fragment of linear logic we introduced in [8] for the purposes of automated verification of security protocols. Following [12], we use multi-conclusion clauses to represent the behaviour of agents in ..."
Abstract
- Add to MetaCart
In this paper we investigate the applicability of a bottom-up evaluation strategy for a first order fragment of linear logic we introduced in [8] for the purposes of automated verification of security protocols. Following [12], we use multi-conclusion clauses to represent the behaviour of agents
Verifying protocol conformance for logic-based communicating agents
- Post-Proc. of 5th Int. Workshop on Computational Logic in Multi-Agent Systems, CLIMA V, LNAI
, 2005
"... Abstract. Communication plays a fundamental role in multi-agents systems. One of the main issues in the design of agent interaction protocols is the verification that a given protocol implementation is “conformant” w.r.t. the abstract specification of it. In this work we tackle those aspects of the ..."
Abstract
-
Cited by 26 (12 self)
- Add to MetaCart
of the conformance verification issue, that regard the dependence/independence of conformance from the agent private state in the case of logic, individual agents, set in a multi-agent framework. We do this by working on a specific agent programming language, DyLOG, and by focussing on interaction protocol
Compliance verification of agent interaction: a logic-based tool
- Applied Artificial Intelligence
, 2006
"... In open societies of agents, where agents are autonomous and heterogeneous, it is not realistic to assume that agents will always act so as to comply to interaction protocols. Thus, the need arises for a formalism to specify constraints on agent interaction, and for a tool able to observe and check ..."
Abstract
-
Cited by 47 (24 self)
- Add to MetaCart
for agent compliance to interaction protocols. In this paper we present a Java-Prolog software component which can be used to verify compliance of agent interaction to protocols written in a logicbased formalism (Social Integrity Constraints). 1
Security Protocol Verification using SPIN
, 1995
"... SPIN is a model checking tool. This paper presents some ideas on how SPIN/PROMELA can be adapted to cover security protocol verification. Existing methods are usually based on logical deduction and theorem proving, and I briefly describe the strength and weaknesses of BAN logic which is one of the m ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
SPIN is a model checking tool. This paper presents some ideas on how SPIN/PROMELA can be adapted to cover security protocol verification. Existing methods are usually based on logical deduction and theorem proving, and I briefly describe the strength and weaknesses of BAN logic which is one
Results 1 - 10
of
1,837