DMCA
List of Beneficiaries Beneficiary Beneficiary Beneficiary Beneficiary Country Date enter Date exit (2007)
Citations
1332 | R.: A logic of authentication
- Burrows, Abadi, et al.
- 1990
(Show Context)
Citation Context ...ptance of emerging IT systemssand applications based on them. Automated Validation of Trust and Securitysof Service-oriented Architectures 01/01/2008 36 FP7-ICT-2007-1 216471 AVANTSSAR Project number =-=(1)-=-sProject acronym (2) ICT-1-1.4 ICT-2007.1.2 ICT-2007.1.1 Service-Oriented Architectures. Secure and dependable infrastructures. Web Services. Trust.sSecurity. Policies. Obligations. Orchestration. For... |
391 | An efficient cryptographic protocol verifier based on Prolog rules. In: CSFW,
- Blanchet
- 2001
(Show Context)
Citation Context ...October 17, 2007 AVANTSSAR, project no. 216471 39 Data abstraction: In the analysis of security protocols, data abstraction has been used to verify protocols for an unbounded number of sessions, e.g. =-=[69, 74, 78, 103, 131, 182, 233]-=-, mapping the infinite set of fresh data created during the sessions to a finite set, and giving sufficient conditions such that this abstraction is correct [79]. For the analysis of services, we plan... |
187 |
Web Services: Concepts, Architectures and Applications.
- Alonso, Casati, et al.
- 2004
(Show Context)
Citation Context ...ther. Still, most currently existing security solutions are limited to protecting applications within a single security context. Moreover, the messagepassing nature of interactions ofWeb Services (WS =-=[8, 234]-=-) and of other security-sensitive services increases their vulnerability: even assuming that the cryptographic primitives work correctly (that is, the system cannot be attacked exploiting weaknesses o... |
179 | Automatic composition of e-services that export their behavior
- Berardi, Calvanese, et al.
(Show Context)
Citation Context ... of the intruder deduction techniques we have employed in [98]. Resolution of structural constraints. In addition to the techniques above, we will explore an approach relying on automata-based models =-=[57, 192]-=- or Petri nets [200] of Web Services. To this end, service message contents will be abstracted away. The satisfiability problem of a ASLan specification in this setting corresponds to the synthesis of... |
146 | Model Driven Security: from UML Models to Access Control Infrastructures
- Basin, Doser, et al.
- 2006
(Show Context)
Citation Context ...ty, software engineering, formal methods (logics, model-checking, and theorem-proving) and application of semi-automated formal methods to distributed systems and security protocols and systems, e.g. =-=[3, 11, 35, 42, 43, 44, 45, 46, 47, 49, 50, 51, 52, 81, 112, 113, 9, 82, 83, 84, 142, 143, 147, 114, 214, 227]-=-. Key Staff Prof. Dr. David Basin (http://www.inf.ethz.ch/∼basin) is a full professor and has the chair for Information Security at ETH Zurich’s Department of Computer Science since January 2003. He i... |
123 | A computationally sound mechanized prover for security protocols. Dependable and Secure Computing,
- BLANCHET
- 2008
(Show Context)
Citation Context ...alysis of security protocols, the basic components of security-sensitive services, has been widely studied and several analysis tools with different degrees of automation have been developed (see e.g =-=[70, 71, 114, 176, 179, 123, 205]-=-). This includes the industrial-strength technology of some of the project partners, the AVISPA Tool for protocol analysis [30] (developed in the context of the EU Project AVISPA “Automated Validation... |
118 |
L.: OFMC: A symbolic model checker for security protocols
- Basin, Mödersheim, et al.
- 2005
(Show Context)
Citation Context ...dations and development and implementation of formal reasoning techniques for the specification and verification of protocols, services, and systems for information security and mobile networks, e.g. =-=[3, 4, 5, 6, 7, 10, 11, 35, 48, 49, 50, 51, 52, 82, 83, 84, 85, 86, 120, 121, 143, 144, 145, 161, 177, 178, 227, 228]-=-. Key Staff Prof. Dr. Luca Viganò (http://profs.sci.univr.it/∼vigano) received his Ph.D. in Computer Science from the University of Saarbrücken, Germany, in 1997, and his Habilitation in Computer Sc... |
117 |
Organization based access control.
- Kalam, Benferhat, et al.
- 2003
(Show Context)
Citation Context ...d through ASLan have to be carefully designed to allow for describing the different aspects, abstraction levels and relations. ASLan thus provides a significant extension to existing policy languages =-=[116, 2, 154, 235]-=-, and will be the first language to allow for comprehensive specifications of all aspects related to service security. FP7-ICT-2007-1 October 17, 2007 AVANTSSAR, project no. 216471 36 WP 3: Automated ... |
117 | Games for synthesis of controllers with partial observation.
- Arnold, Vincent, et al.
- 2003
(Show Context)
Citation Context ...rmit such an implementation, we plan to employ other techniques from automatic control theory [196] to automatically synthesise services in this abstraction. Existing algorithms for automatic control =-=[29, 128]-=- provide effective decision procedures in a general setting. We will develop methods based on these general techniques but dedicated and tailored to the specific case of the constraints imposed on ser... |
108 | Automatic Composition of Transition-based Semantic Web Services with Messaging.
- Berardi, Calvanese, et al.
- 2005
(Show Context)
Citation Context ...e combination of trust and security policies and protocols. In particular, while initial work has been carried out on the automatic composition of security policies or requirements for services (e.g. =-=[192, 225, 56, 63]-=-), none of these approaches has sufficient coverage for our purposes, and major questions remain unanswered. As we already remarked above, the same holds, for example, also to the security analysis of... |
83 |
A rewriting approach to satisfiability procedures.
- Armando, Ranise, et al.
- 2003
(Show Context)
Citation Context ...eir implementation in the AVANTSSAR platform (WP 4). Expertise: Automated Reasoning and Model Checking of Software and Protocols The UGDIST group has a long history of research in Automated Reasoning =-=[23, 133, 28, 16, 25, 26, 27, 14]-=- and its application to model checking of software [12, 24, 13] and of security protocols [19, 22, 18, 11, 15, 20]. In particular, the group has shown how protocol insecurity can be reduced to an AI p... |
80 | Verified Interoperable Implementations of Security Protocols”, Proceeding in
- Bhargavan, Fournet, et al.
- 2008
(Show Context)
Citation Context ...t we will discuss in Section B3 (such as the SENSORIA project and the NESSI Open Framework), the project that is most closely related to AVANTSSAR is the Samoa project at Microsoft Research Cambridge =-=[64, 65, 66, 67, 68, 136]-=-. This approach exploits recent advances in the analysis of security protocols in the practical setting of XML Web Services. Samoa proposes a logic-based approach to checking SOAP-based protocols base... |
71 | Sat-based procedures for temporal reasoning. - Armando, Castellini, et al. - 1999 |
71 | L.: An on-the-fly model-checker for security protocol analysis.
- Basin, Modersheim, et al.
- 2003
(Show Context)
Citation Context ...dations and development and implementation of formal reasoning techniques for the specification and verification of protocols, services, and systems for information security and mobile networks, e.g. =-=[3, 4, 5, 6, 7, 10, 11, 35, 48, 49, 50, 51, 52, 82, 83, 84, 85, 86, 120, 121, 143, 144, 145, 161, 177, 178, 227, 228]-=-. Key Staff Prof. Dr. Luca Viganò (http://profs.sci.univr.it/∼vigano) received his Ph.D. in Computer Science from the University of Saarbrücken, Germany, in 1997, and his Habilitation in Computer Sc... |
64 | Trustx: A peer-to-peer framework for trust establishment.
- Bertino, Ferrari, et al.
- 2004
(Show Context)
Citation Context ...tials. Note that for the case of dynamic service composition these communication protocols have to be generated at runtime and existing trust negotiation systems do not support this runtime synthesis =-=[75, 237, 60, 184, 213, 167]-=-. Since many security mechanisms are implemented using cryptographic techniques, our work will benefit from the experience and the efficient analysis methods for cryptographic protocols that we have a... |
62 | L.: Bounded model checking of software using SMT solvers instead of SAT solvers
- Armando, Mantovani, et al.
- 2009
(Show Context)
Citation Context ...and Model Checking of Software and Protocols The UGDIST group has a long history of research in Automated Reasoning [23, 133, 28, 16, 25, 26, 27, 14] and its application to model checking of software =-=[12, 24, 13]-=- and of security protocols [19, 22, 18, 11, 15, 20]. In particular, the group has shown how protocol insecurity can be reduced to an AI planning problem and, in turn, to a sequence of SAT problems whi... |
53 | L.: SAT-based Model-Checking for Security Protocols Analysis
- Armando, Compagna
- 2008
(Show Context)
Citation Context ...ocols The UGDIST group has a long history of research in Automated Reasoning [23, 133, 28, 16, 25, 26, 27, 14] and its application to model checking of software [12, 24, 13] and of security protocols =-=[19, 22, 18, 11, 15, 20]-=-. In particular, the group has shown how protocol insecurity can be reduced to an AI planning problem and, in turn, to a sequence of SAT problems which can be solved by means of state-of-the-art SAT s... |
53 | A toolkit for managing enterprise privacy policies. In:
- Backes, Pfitzmann, et al.
- 2003
(Show Context)
Citation Context ...Oriented Architectures The security and cryptography group has experience in the design and analysis of security-sensitive algorithms, protocols, and service-oriented architectures and their policies =-=[37, 88, 87, 150, 159]-=-. The experience in security covers the entire range from computational reasoning in cryptography to the formal analysis of systems [11, 35, 49, 50, 51, 143, 144], including work to bridge the gap bet... |
52 | Web service interfaces
- Beyer, Chakrabarti, et al.
(Show Context)
Citation Context ...e combination of trust and security policies and protocols. In particular, while initial work has been carried out on the automatic composition of security policies or requirements for services (e.g. =-=[192, 225, 56, 63]-=-), none of these approaches has sufficient coverage for our purposes, and major questions remain unanswered. As we already remarked above, the same holds, for example, also to the security analysis of... |
49 | A Semantics for Web Services Authentication
- Bhargavan, Fournet, et al.
- 2004
(Show Context)
Citation Context ...t we will discuss in Section B3 (such as the SENSORIA project and the NESSI Open Framework), the project that is most closely related to AVANTSSAR is the Samoa project at Microsoft Research Cambridge =-=[64, 65, 66, 67, 68, 136]-=-. This approach exploits recent advances in the analysis of security protocols in the practical setting of XML Web Services. Samoa proposes a logic-based approach to checking SOAP-based protocols base... |
48 | Relating Symbolic and Cryptographic Secrecy” - Backes - 2005 |
47 | TulaFale: A Security Tool for Web Services,”
- Bhargavan, Fournet, et al.
- 2004
(Show Context)
Citation Context ...t we will discuss in Section B3 (such as the SENSORIA project and the NESSI Open Framework), the project that is most closely related to AVANTSSAR is the Samoa project at Microsoft Research Cambridge =-=[64, 65, 66, 67, 68, 136]-=-. This approach exploits recent advances in the analysis of security protocols in the practical setting of XML Web Services. Samoa proposes a logic-based approach to checking SOAP-based protocols base... |
44 | L.: LTL Model Checking for Security Protocols
- Armando, Carbone, et al.
- 2009
(Show Context)
Citation Context ... general, these properties are difficult to verify with automated tools. But some experiments have been successful performed using Murphi in [218] and using AVISPA’s back-ends OFMC in [141] and SATMC =-=[15]-=- (see also [217]). There is also a possibility to get automated proofs for such properties thanks to recent results in [155] that give a complete verification algorithm for contract signing protocols ... |
39 | The AVISS security protocol analysis tool,
- Armando, Basin, et al.
- 2002
(Show Context)
Citation Context ...dations and development and implementation of formal reasoning techniques for the specification and verification of protocols, services, and systems for information security and mobile networks, e.g. =-=[3, 4, 5, 6, 7, 10, 11, 35, 48, 49, 50, 51, 52, 82, 83, 84, 85, 86, 120, 121, 143, 144, 145, 161, 177, 178, 227, 228]-=-. Key Staff Prof. Dr. Luca Viganò (http://profs.sci.univr.it/∼vigano) received his Ph.D. in Computer Science from the University of Saarbrücken, Germany, in 1997, and his Habilitation in Computer Sc... |
39 | Symmetric authentication within a simulatable cryptographic library
- Backes, Pfitzmann, et al.
- 2003
(Show Context)
Citation Context ... entire range from computational reasoning in cryptography to the formal analysis of systems [11, 35, 49, 50, 51, 143, 144], including work to bridge the gap between these different views of security =-=[36, 38, 220]-=-. Key Staff Dr. Birgit Pfitzmann (http://www.zurich.ibm.com/∼bpf/) is a senior research staff member of IBM Research at the Zurich Research Lab. Birgit Pfitzmann joined IBM in 2001. Since then she con... |
33 |
Verifying policy-based security for web services.
- Bhargavan, Fournet, et al.
- 2004
(Show Context)
Citation Context ...t we will discuss in Section B3 (such as the SENSORIA project and the NESSI Open Framework), the project that is most closely related to AVANTSSAR is the Samoa project at Microsoft Research Cambridge =-=[64, 65, 66, 67, 68, 136]-=-. This approach exploits recent advances in the analysis of security protocols in the practical setting of XML Web Services. Samoa proposes a logic-based approach to checking SOAP-based protocols base... |
32 |
Embedding Complex Decision Procedures inside an Interactive Theorem Prover
- Armando, Giunchiglia
- 1993
(Show Context)
Citation Context ...eir implementation in the AVANTSSAR platform (WP 4). Expertise: Automated Reasoning and Model Checking of Software and Protocols The UGDIST group has a long history of research in Automated Reasoning =-=[23, 133, 28, 16, 25, 26, 27, 14]-=- and its application to model checking of software [12, 24, 13] and of security protocols [19, 22, 18, 11, 15, 20]. In particular, the group has shown how protocol insecurity can be reduced to an AI p... |
30 | Secure sessions for web services.
- Bhargavan, Corin, et al.
- 2004
(Show Context)
Citation Context ...t we will discuss in Section B3 (such as the SENSORIA project and the NESSI Open Framework), the project that is most closely related to AVANTSSAR is the Samoa project at Microsoft Research Cambridge =-=[64, 65, 66, 67, 68, 136]-=-. This approach exploits recent advances in the analysis of security protocols in the practical setting of XML Web Services. Samoa proposes a logic-based approach to checking SOAP-based protocols base... |
28 | On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal
- Armando, Bonacina, et al.
(Show Context)
Citation Context ...eir implementation in the AVANTSSAR platform (WP 4). Expertise: Automated Reasoning and Model Checking of Software and Protocols The UGDIST group has a long history of research in Automated Reasoning =-=[23, 133, 28, 16, 25, 26, 27, 14]-=- and its application to model checking of software [12, 24, 13] and of security protocols [19, 22, 18, 11, 15, 20]. In particular, the group has shown how protocol insecurity can be reduced to an AI p... |
28 | Lazy infinite-state analysis of security protocols.
- Basin
- 1999
(Show Context)
Citation Context ...ty, software engineering, formal methods (logics, model-checking, and theorem-proving) and application of semi-automated formal methods to distributed systems and security protocols and systems, e.g. =-=[3, 11, 35, 42, 43, 44, 45, 46, 47, 49, 50, 51, 52, 81, 112, 113, 9, 82, 83, 84, 142, 143, 147, 114, 214, 227]-=-. Key Staff Prof. Dr. David Basin (http://www.inf.ethz.ch/∼basin) is a full professor and has the chair for Information Security at ETH Zurich’s Department of Computer Science since January 2003. He i... |
27 | Compositional analysis of contract-signing protocols,”
- Backes, Datta, et al.
- 2006
(Show Context)
Citation Context ...k was distinguished by an AFIF national award. Since 2005 he is researcher at INRIA (Nancy). His researches focuses on theoretical and practical aspects of the verification of cryptographic protocols =-=[204, 97, 33]-=-. Dr. Laurent Vigneron (http://www.loria.fr/∼vigneron) is an assistant professor at the University Nancy 2 since 1997, and works at LORIA. He received his Ph.D. from University of Nancy in 1994, and h... |
27 |
Provisions and obligations in policy rule management
- Bettini, Jajodia, et al.
- 2003
(Show Context)
Citation Context ...titled to call S1. Thus, language constructs are needed to express the possibility of policy change over time. Obligations. Another example of policy implementation occurs with respect to obligations =-=[62, 148, 41, 223]-=- imposed on a user after a resource has been utilised. Consider a requirement on logging particular events for a composed service that is expressed by a policy stating which events have to be logged u... |
25 |
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning
- Armando, Compagna
(Show Context)
Citation Context ...ocols The UGDIST group has a long history of research in Automated Reasoning [23, 133, 28, 16, 25, 26, 27, 14] and its application to model checking of software [12, 24, 13] and of security protocols =-=[19, 22, 18, 11, 15, 20]-=-. In particular, the group has shown how protocol insecurity can be reduced to an AI planning problem and, in turn, to a sequence of SAT problems which can be solved by means of state-of-the-art SAT s... |
25 | Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols
- Basin, Mödersheim, et al.
- 2003
(Show Context)
Citation Context ...for the automated analysis of services whose operations may often be independent. POR has already been employed by project members together with symbolic techniques in cryptographic protocol analysis =-=[49]-=-. Our second task will be to integrate the different attacker models that will be developed in WP 3.3 into a unified attacker model against which we will assess the security of a composed service. We ... |
24 | Access Control and Authorization Constraints for WS-BPEL”. ICWS - Bertino, Crampton, et al. - 2006 |
23 | Automatic Synthesis of Recursive Programs: the Proof-Planning Paradigm
- Armando, Smaill
(Show Context)
Citation Context ...eir implementation in the AVANTSSAR platform (WP 4). Expertise: Automated Reasoning and Model Checking of Software and Protocols The UGDIST group has a long history of research in Automated Reasoning =-=[23, 133, 28, 16, 25, 26, 27, 14]-=- and its application to model checking of software [12, 24, 13] and of security protocols [19, 22, 18, 11, 15, 20]. In particular, the group has shown how protocol insecurity can be reduced to an AI p... |
23 | Algebraic intruder deductions
- Basin, Mödersheim, et al.
- 2005
(Show Context)
Citation Context ...3.2 will permit to glue these attacker models into a unified threat model. In the last few years the Dolev-Yao model has been extended to take into account the properties of lowlevel primitives (e.g. =-=[110, 118, 166, 50, 97, 93, 100]-=-). These extensions are however insufficient to address the problems we will tackle in this proposal [34]. We list now some of the extensions that will be needed: FP7-ICT-2007-1 October 17, 2007 AVANT... |
22 | Symbolic and cryptographic analysis of the secure wsreliablemessaging scenario
- Backes, Moedersheim, et al.
(Show Context)
Citation Context ...gely outside the scope of state-of-the-art technologies. Besides the recent application of standard techniques such as model-checking to the formal analysis of security systems and Web Services (e.g. =-=[34, 35, 130, 150, 206]-=-), and aside from other related work that we will discuss in Section B3 (such as the SENSORIA project and the NESSI Open Framework), the project that is most closely related to AVANTSSAR is the Samoa ... |
20 |
SAT-based Model-Checking of Security Protocols using Planning Graph Analysis
- Armando, Compagna, et al.
- 2003
(Show Context)
Citation Context ...ocols The UGDIST group has a long history of research in Automated Reasoning [23, 133, 28, 16, 25, 26, 27, 14] and its application to model checking of software [12, 24, 13] and of security protocols =-=[19, 22, 18, 11, 15, 20]-=-. In particular, the group has shown how protocol insecurity can be reduced to an AI planning problem and, in turn, to a sequence of SAT problems which can be solved by means of state-of-the-art SAT s... |
17 | On temporal abstractions of web service protocols
- Benatallah, Casati, et al.
- 2005
(Show Context)
Citation Context ...ce they might be critical for many application, e.g. healthcare, certificate validity period, and the like. This may require an extension of the satisfiability procedures of WP 3.1 (see, for example, =-=[54]-=-). 2. The TS Orchestrator will then apply a synthesis algorithm in order to build on-the-fly the protocols for exchanging the credentials required to comply with the respective policies of the compone... |
17 |
Automatic Service Composition: Models, Techniques and Tools.
- Berardi
- 2005
(Show Context)
Citation Context ..., by introducing a refinement layer and refining a service call to a directory service call with dynamic binding. We will address modelling issues for which there is currently little work so far (cf. =-=[55, 192, 63]-=-), such as modelling service disruption or reconfiguration of the service infrastructure. Along the way we will address provisions for changing services that are already present, as a change in the se... |
13 | Model checking linear programs with arrays - Armando, Benerecetti, et al. - 2006 |
10 | 2001, ‘Towards an Awareness-Based Semantics for Security Protocol Analysis
- Accorsi, Basin, et al.
(Show Context)
Citation Context ...dations and development and implementation of formal reasoning techniques for the specification and verification of protocols, services, and systems for information security and mobile networks, e.g. =-=[3, 4, 5, 6, 7, 10, 11, 35, 48, 49, 50, 51, 52, 82, 83, 84, 85, 86, 120, 121, 143, 144, 145, 161, 177, 178, 227, 228]-=-. Key Staff Prof. Dr. Luca Viganò (http://profs.sci.univr.it/∼vigano) received his Ph.D. in Computer Science from the University of Saarbrücken, Germany, in 1997, and his Habilitation in Computer Sc... |
10 |
Sufficient conditions for composing security protocols
- Andova, Cremers, et al.
(Show Context)
Citation Context ...problems such as these, AVANTSSAR will go beyond mere extension and optimisation of existing methods. As a central issue, we will develop novel compositional reasoning techniques based on recent work =-=[9]-=- that gives sufficient, automatically verifiable conditions for protocols not to interfere at the network level, and includes the development of decomposition techniques that detect component services... |
10 |
Abstraction Refinement of Linear Programs with Arrays
- Armando, Benerecetti, et al.
(Show Context)
Citation Context ...and Model Checking of Software and Protocols The UGDIST group has a long history of research in Automated Reasoning [23, 133, 28, 16, 25, 26, 27, 14] and its application to model checking of software =-=[12, 24, 13]-=- and of security protocols [19, 22, 18, 11, 15, 20]. In particular, the group has shown how protocol insecurity can be reduced to an AI planning problem and, in turn, to a sequence of SAT problems whi... |
10 | Maude versus Haskell: an experimental comparison in security protocol analysis
- Basin, Denker
- 2000
(Show Context)
Citation Context ...ty, software engineering, formal methods (logics, model-checking, and theorem-proving) and application of semi-automated formal methods to distributed systems and security protocols and systems, e.g. =-=[3, 11, 35, 42, 43, 44, 45, 46, 47, 49, 50, 51, 52, 81, 112, 113, 9, 82, 83, 84, 142, 143, 147, 114, 214, 227]-=-. Key Staff Prof. Dr. David Basin (http://www.inf.ethz.ch/∼basin) is a full professor and has the chair for Information Security at ETH Zurich’s Department of Computer Science since January 2003. He i... |
10 | Bytecode Model Checking: An Experimental Analysis
- Basin, Friedrich, et al.
- 2002
(Show Context)
Citation Context ...ty, software engineering, formal methods (logics, model-checking, and theorem-proving) and application of semi-automated formal methods to distributed systems and security protocols and systems, e.g. =-=[3, 11, 35, 42, 43, 44, 45, 46, 47, 49, 50, 51, 52, 81, 112, 113, 9, 82, 83, 84, 142, 143, 147, 114, 214, 227]-=-. Key Staff Prof. Dr. David Basin (http://www.inf.ethz.ch/∼basin) is a full professor and has the chair for Information Security at ETH Zurich’s Department of Computer Science since January 2003. He i... |
10 |
Automatic Verification of Cryptographic Protocols: A Logic Programming Approach
- Blanchet
- 2003
(Show Context)
Citation Context ...alysis of security protocols, the basic components of security-sensitive services, has been widely studied and several analysis tools with different degrees of automation have been developed (see e.g =-=[70, 71, 114, 176, 179, 123, 205]-=-). This includes the industrial-strength technology of some of the project partners, the AVISPA Tool for protocol analysis [30] (developed in the context of the EU Project AVISPA “Automated Validation... |
9 | A Formal Analysis of the CORBA Security Service”, In: - Basin, Rittinger, et al. - 2002 |
9 | Handling algebraic properties in automatic analysis of security protocols - Boichut, Héam, et al. |
8 | A Practical Extension Mechanism for Decision Procedures
- Armando, Ranise
(Show Context)
Citation Context ...eir implementation in the AVANTSSAR platform (WP 4). Expertise: Automated Reasoning and Model Checking of Software and Protocols The UGDIST group has a long history of research in Automated Reasoning =-=[23, 133, 28, 16, 25, 26, 27, 14]-=- and its application to model checking of software [12, 24, 13] and of security protocols [19, 22, 18, 11, 15, 20]. In particular, the group has shown how protocol insecurity can be reduced to an AI p... |
7 | Towards a Quantitative Analysis of Security Protocols
- Adao, Mateus, et al.
(Show Context)
Citation Context ...dations and development and implementation of formal reasoning techniques for the specification and verification of protocols, services, and systems for information security and mobile networks, e.g. =-=[3, 4, 5, 6, 7, 10, 11, 35, 48, 49, 50, 51, 52, 82, 83, 84, 85, 86, 120, 121, 143, 144, 145, 161, 177, 178, 227, 228]-=-. Key Staff Prof. Dr. Luca Viganò (http://profs.sci.univr.it/∼vigano) received his Ph.D. in Computer Science from the University of Saarbrücken, Germany, in 1997, and his Habilitation in Computer Sc... |
7 | Software model checking using linear constraints
- Armando, Castellini, et al.
- 2004
(Show Context)
Citation Context ...ocols The UGDIST group has a long history of research in Automated Reasoning [23, 133, 28, 16, 25, 26, 27, 14] and its application to model checking of software [12, 24, 13] and of security protocols =-=[19, 22, 18, 11, 15, 20]-=-. In particular, the group has shown how protocol insecurity can be reduced to an AI planning problem and, in turn, to a sequence of SAT problems which can be solved by means of state-of-the-art SAT s... |
7 | Termination of Constraint Contextual Rewriting
- Armando, Ranise
- 2000
(Show Context)
Citation Context ...eir implementation in the AVANTSSAR platform (WP 4). Expertise: Automated Reasoning and Model Checking of Software and Protocols The UGDIST group has a long history of research in Automated Reasoning =-=[23, 133, 28, 16, 25, 26, 27, 14]-=- and its application to model checking of software [12, 24, 13] and of security protocols [19, 22, 18, 11, 15, 20]. In particular, the group has shown how protocol insecurity can be reduced to an AI p... |
7 |
Tailoring the dolev-yao abstraction to web service realities
- Backes, Gross
- 2005
(Show Context)
Citation Context ...gely outside the scope of state-of-the-art technologies. Besides the recent application of standard techniques such as model-checking to the formal analysis of security systems and Web Services (e.g. =-=[34, 35, 130, 150, 206]-=-), and aside from other related work that we will discuss in Section B3 (such as the SENSORIA project and the NESSI Open Framework), the project that is most closely related to AVANTSSAR is the Samoa ... |
5 |
Java Byte Code Verification by Model Checking
- Basin, Friedrich, et al.
- 1999
(Show Context)
Citation Context ...ty, software engineering, formal methods (logics, model-checking, and theorem-proving) and application of semi-automated formal methods to distributed systems and security protocols and systems, e.g. =-=[3, 11, 35, 42, 43, 44, 45, 46, 47, 49, 50, 51, 52, 81, 112, 113, 9, 82, 83, 84, 142, 143, 147, 114, 214, 227]-=-. Key Staff Prof. Dr. David Basin (http://www.inf.ethz.ch/∼basin) is a full professor and has the chair for Information Security at ETH Zurich’s Department of Computer Science since January 2003. He i... |
4 | The SAT-based approach to separation logic
- Armando, Castellini, et al.
- 2006
(Show Context)
Citation Context ... Springer. [15] A. Armando, R. Carbone and L. Compagna. LTL Model Checking for Security Protocols. In the Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20), Springer, 2007. =-=[17]-=- A. Armando, C. Castellini, E. Giunchiglia, and M. Maratea. The SAT-based approach to separation logic. Journal of Automated Reasoning, pages 1–27, 2006. [13] A. Armando, M. Benerecetti, and J. Mantov... |
4 |
Specifying and verifying hysteresis signature system with HOL-Z
- Basin, Kuruma, et al.
- 2004
(Show Context)
Citation Context ...ty, software engineering, formal methods (logics, model-checking, and theorem-proving) and application of semi-automated formal methods to distributed systems and security protocols and systems, e.g. =-=[3, 11, 35, 42, 43, 44, 45, 46, 47, 49, 50, 51, 52, 81, 112, 113, 9, 82, 83, 84, 142, 143, 147, 114, 214, 227]-=-. Key Staff Prof. Dr. David Basin (http://www.inf.ethz.ch/∼basin) is a full professor and has the chair for Information Security at ETH Zurich’s Department of Computer Science since January 2003. He i... |
3 | Modal specifications of trace-based security properties
- Accorsi, Basin, et al.
- 2002
(Show Context)
Citation Context ...dations and development and implementation of formal reasoning techniques for the specification and verification of protocols, services, and systems for information security and mobile networks, e.g. =-=[3, 4, 5, 6, 7, 10, 11, 35, 48, 49, 50, 51, 52, 82, 83, 84, 85, 86, 120, 121, 143, 144, 145, 161, 177, 178, 227, 228]-=-. Key Staff Prof. Dr. Luca Viganò (http://profs.sci.univr.it/∼vigano) received his Ph.D. in Computer Science from the University of Saarbrücken, Germany, in 1997, and his Habilitation in Computer Sc... |
3 | On Quantitative Analysis of Probabilistic Protocols
- Aldini, Pierro
- 2005
(Show Context)
Citation Context ...dations and development and implementation of formal reasoning techniques for the specification and verification of protocols, services, and systems for information security and mobile networks, e.g. =-=[3, 4, 5, 6, 7, 10, 11, 35, 48, 49, 50, 51, 52, 82, 83, 84, 85, 86, 120, 121, 143, 144, 145, 161, 177, 178, 227, 228]-=-. Key Staff Prof. Dr. Luca Viganò (http://profs.sci.univr.it/∼vigano) received his Ph.D. in Computer Science from the University of Saarbrücken, Germany, in 1997, and his Habilitation in Computer Sc... |
3 |
Congruence Closure modulo AssociativityCommutativity
- Bachmair, Ramakrishnan, et al.
- 2000
(Show Context)
Citation Context ...on platform (WP 4). Expertise: Theoretical Foundations and Automated Tools for Security Analysis The Cassis group at INRIA has a strong, internationally acknowledged experience in automated deduction =-=[32, 108, 202, 230, 229, 231]-=- and security analysis [204, 92, 111, 152, 11]. Dr. Rusinowitch is the head of the Cassis group and has participated as site leader in the FET Open Project IST-2001-39252 AVISPA [30]. Key Staff Dr. Mi... |
2 | A probabilistic property-specific approach to information flow
- Beauquier, Minea
- 2005
(Show Context)
Citation Context ...g, and abstraction in software verification. IeAT plans to support one PhD student for the full duration of the project and hire one post-doc starting with the second year. Five relevant publications =-=[53]-=- D. Beauquier, M. Duflot, M. Minea. A probabilistic property-specific approach to information flow. In Mathematical Methods, Models, and Architectures for Computer Network Security. 3rd International ... |
2 | Security in soa and web services - Bertino, Martino - 2006 |
1 | Noninterference and the most powerful probabilistic adversary
- Aldini, Pierro
- 2006
(Show Context)
Citation Context ...dations and development and implementation of formal reasoning techniques for the specification and verification of protocols, services, and systems for information security and mobile networks, e.g. =-=[3, 4, 5, 6, 7, 10, 11, 35, 48, 49, 50, 51, 52, 82, 83, 84, 85, 86, 120, 121, 143, 144, 145, 161, 177, 178, 227, 228]-=-. Key Staff Prof. Dr. Luca Viganò (http://profs.sci.univr.it/∼vigano) received his Ph.D. in Computer Science from the University of Saarbrücken, Germany, in 1997, and his Habilitation in Computer Sc... |
1 |
Constitution et développement d’une logique de modalités aléthiques, déontiques, dynamiques et temporelles en vue de la formalisation du raisonnement sur les actions et sur les normes
- Balbiani
- 2005
(Show Context)
Citation Context ...itional dynamic logic with intersection, that permits to express parallelism, and on deontic logic, that permits to express norms. This work has lead to the definition of a logic for privacy policies =-=[2, 39, 41]-=-. Team member Y. Chevalier has previously worked within the AVISPA project on the automated analysis of cryptographic protocols [102, 101, 104, 10, 92, 96, 95, 94, 99, 11]. Since June 2006, he collabo... |
1 |
Safety problems in access control with temporal constraints
- Balbiani, Cheikh
- 2005
(Show Context)
Citation Context ...i nets. UPS-IRIT will hire two PhD students and one Post-doc student (for one year) to work on the project. Five relevant publications FP7-ICT-2007-1 October 17, 2007 AVANTSSAR, project no. 216471 93 =-=[40]-=- P. Balbiani and F. Cheikh. Safety problems in access control with temporal constraints. InMMM-ACNS, vol. 3685 of LNCS, pp. 165–178. Springer, 2005. [41] P. Balbiani, Y. Chevalier, and M. Kourjieh. Re... |
1 |
Reasoning on actions and obligations. available at http://www. easychair.org/FLoC-06/fcs-arspa06.pdf
- Balbiani, Chevalier, et al.
(Show Context)
Citation Context ...titled to call S1. Thus, language constructs are needed to express the possibility of policy change over time. Obligations. Another example of policy implementation occurs with respect to obligations =-=[62, 148, 41, 223]-=- imposed on a user after a resource has been utilised. Consider a requirement on logging particular events for a composed service that is expressed by a policy stating which events have to be logged u... |
1 |
Securite Informatique. Eyrolles Edition
- Bloch, Wolfhugel, et al.
(Show Context)
Citation Context ...n among Clients and Partners. OPENTRUST will hire a new engineer or Ph.D. student for working on AVANTSSAR. FP7-ICT-2007-1 October 17, 2007 AVANTSSAR, project no. 216471 99 Five relevant publications =-=[72]-=- L. Bloch, C. Wolfhugel, N. Makarevitch, C. Queinnec, and H. Schauer. Securite Informatique, Eyrolles Edition, 2006. [162] M. F. Krafft, R. Hertzog, R. Mas, and N. Makarevitch. Debian, administration ... |