Using UMLsec and goal trees for secure systems development
Proceedings of the 2002 ACM symposium on Applied computing
Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Mechanical Proofs about a Non-repudiation Protocol
TPHOLs '01 Proceedings of the 14th International Conference on Theorem Proving in Higher Order Logics
Analysing a Stream Authentication Protocol Using Model Checking
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
Mechanising a Protocol for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Securing Communication in a Concurrent Language
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
An Improved Constraint-Based System for the Verification of Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Protocol Engineering Applied to Formal Analysis of Security Systems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Types for Cryptographic Protocols
CONCUR '02 Proceedings of the 13th International Conference on Concurrency Theory
Suitability of a Classical Analysis Method for E-commerce Protocols
ISC '01 Proceedings of the 4th International Conference on Information Security
Verifying authentication protocol implementations
FMOODS '02 Proceedings of the IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems V
Inductive verification of smart card protocols
Journal of Computer Security
Proceedings of the 25th International Conference on Software Engineering
Strand Spaces and Rank Functions: More than Distant Cousins
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Availability of protocol goals
Proceedings of the 2003 ACM symposium on Applied computing
Automatic verification of the TLS handshake protocol
Proceedings of the 2004 ACM symposium on Applied computing
Security properties: two agents are sufficient
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
Communicating quantum processes
Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Formal prototyping in early stages of protocol design
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Information security education in the UK: a proposed course in secure e-commerce systems
Proceedings of the 1st annual conference on Information security curriculum development
A decision procedure for the existence of a rank function
Journal of Computer Security
Timed spi-calculus with types for secrecy and authenticity
CONCUR 2005 - Concurrency Theory
A modular correctness proof of IEEE 802.11i and TLS
Proceedings of the 12th ACM conference on Computer and communications security
Bootstrapping multi-party ad-hoc security
Proceedings of the 2006 ACM symposium on Applied computing
Modeling and verification of cryptographic protocols using coloured petri nets and design/CPN
Nordic Journal of Computing
Logics for reasoning about cryptographic constructions
Journal of Computer and System Sciences - Special issue on FOCS 2003
Visual security protocol modeling
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Accountability protocols: Formalized and verified
ACM Transactions on Information and System Security (TISSEC)
On the semantics of Alice&Bob specifications of security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
Theoretical Computer Science - Automated reasoning for security protocol analysis
Injective synchronisation: an extension of the authentication hierarchy
Theoretical Computer Science - Automated reasoning for security protocol analysis
A framework for security analysis of mobile wireless networks
Theoretical Computer Science - Automated reasoning for security protocol analysis
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
Secure sessions for Web services
ACM Transactions on Information and System Security (TISSEC)
Cross-layer verification of type flaw attacks on security protocols
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
Temporal Logics of Knowledge and their Applications in Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Embedding agents within the intruder to detect parallel attacks
Journal of Computer Security - Special issue on CSFW15
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Anonymity protocols as noisy channels
Information and Computation
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 10th ACM workshop on Multimedia and security
Automated Evaluation of Secure Route Discovery in MANET Protocols
SPIN '08 Proceedings of the 15th international workshop on Model Checking Software
A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking
ICFEM '08 Proceedings of the 10th International Conference on Formal Methods and Software Engineering
Formal Modelling of PKI Based Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder
Formal Aspects in Security and Trust
Verifying Multi-party Authentication Using Rank Functions and PVS
Formal Aspects in Security and Trust
Graduate follow up as a vehicle for CSIT curriculum assessment and improvement
Proceedings of the 14th Western Canadian Conference on Computing Education
Probabilistic and nondeterministic aspects of anonymity
Theoretical Computer Science
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
Electronic Notes in Theoretical Computer Science (ENTCS)
On Refinement-Closed Security Properties and Nondeterministic Compositions
Electronic Notes in Theoretical Computer Science (ENTCS)
The Stable Revivals Model in CSP-Prover
Electronic Notes in Theoretical Computer Science (ENTCS)
Security protocols analysis: A SDL-based approach
Computer Standards & Interfaces
Analysis of authentication protocols in agent-based systems using labeled tableaux
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on cybernetics and cognitive informatics
Semantics and logic for security protocols
Journal of Computer Security
Sums and Lovers: Case Studies in Security, Compositionality and Refinement
FM '09 Proceedings of the 2nd World Congress on Formal Methods
Analysing the BKE-security Protocol with μCRL
Electronic Notes in Theoretical Computer Science (ENTCS)
Electronic Notes in Theoretical Computer Science (ENTCS)
A Syntactic Criterion for Injectivity of Authentication Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Metareasoning about Security Protocols using Distributed Temporal Logic
Electronic Notes in Theoretical Computer Science (ENTCS)
Probabilistic and Nondeterministic Aspects of Anonymity
Electronic Notes in Theoretical Computer Science (ENTCS)
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
On the Relationship Between Web Services Security and Traditional Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
A Formalization of Credit and Responsibility Within the GNDC Schema
Electronic Notes in Theoretical Computer Science (ENTCS)
Applying SDL to formal analysis of security systems
SDL'03 Proceedings of the 11th international conference on System design
Optimistic non-repudiation protocol analysis
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Structured CSP: a process algebra as an institution
WADT'06 Proceedings of the 18th international conference on Recent trends in algebraic development techniques
Security properties: two agents are sufficient
ESOP'03 Proceedings of the 12th European conference on Programming
Verifying smart card applications: an ASM approach
IFM'07 Proceedings of the 6th international conference on Integrated formal methods
A theorem-proving approach to verification of fair non-repudiation protocols
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Analysis of EAP-GPSK authentication protocol
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Formal approaches to information-hiding (Tutorial)
TGC'07 Proceedings of the 3rd conference on Trustworthy global computing
Enhancing Java security with history based access control
Foundations of security analysis and design IV
A logic-based verification framework for authentication protocols
International Journal of Internet Technology and Secured Transactions
Secure ownership and ownership transfer in RFID systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Computers and Electrical Engineering
Modelling watermark communication protocols using the CASPER modelling language
Proceedings of the 12th ACM workshop on Multimedia and security
Multi-Attacker Protocol Validation
Journal of Automated Reasoning
Distributed temporal logic for the analysis of security protocol models
Theoretical Computer Science
Application-binding protocol in the user centric smart card ownership model
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Enforcing S&D pattern design in RCES with modeling and formal approaches
Proceedings of the 14th international conference on Model driven engineering languages and systems
From security protocols to systems security
Proceedings of the 11th international conference on Security Protocols
Verifying a chipcard-based biometric identification protocol in VSE
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Security and privacy analysis of RFID systems using model checking
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Specifying authentication using signal events in CSP
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
SeVe: automatic tool for verification of security protocols
Frontiers of Computer Science in China
A generic theorem prover of CSP refinement
TACAS'05 Proceedings of the 11th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Exploiting empirical engagement in authentication protocol design
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Formal verification of a type flaw attack on a security protocol using object-z
ZB'05 Proceedings of the 4th international conference on Formal Specification and Development in Z and B
WSCMon: runtime monitoring of web service orchestration based on refinement checking
Service Oriented Computing and Applications
Network vulnerability analysis through vulnerability take-grant model (VTG)
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Application of model checking to AXML system's security: a case study
WS-FM'06 Proceedings of the Third international conference on Web Services and Formal Methods
Verifying security protocols: an application of CSP
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
Operational semantics for fun and profit
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Analysing a biometric authentication protocol for 3g mobile systems using CSP and rank functions
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Tools for traceable security verification
VoCS'08 Proceedings of the 2008 international conference on Visions of Computer Science: BCS International Academic Conference
Towards unconditional soundness: computationally complete symbolic attacker
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Application of formal analysis to enhancing trust in a complex grid-based operating system
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems
From model-checking to automated testing of security protocols: bridging the gap
TAP'12 Proceedings of the 6th international conference on Tests and Proofs
Early fault detection in industry using models at various abstraction levels
IFM'12 Proceedings of the 9th international conference on Integrated Formal Methods
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
An updated threat model for security ceremonies
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
Fairness analysis of e-commerce protocols based on strand spaces
International Journal of Grid and Utility Computing
Reverse Authentication in Financial Transactions and Identity Management
Mobile Networks and Applications
The Journal of Supercomputing
Hi-index | 0.00 |
Security protocols are one of the most critical elements in enabling the secure communication and processing of information, ensuring its confidentiality, integrity, authenticity and availability. These protocols are vulnerable to a host of subtle attacks, so designing protocols to be impervious to such attacks has proved to be extremely challenging and error prone.This book provides a thorough and detailed understanding of one of the most effective approaches to the design and evaluation of security critical systems, describing the role of security protocols in distributed secure systems and the vulnerabilities to which they are prey.The authors introduce security protocols, the role they play and the cryptographic mechanisms they employ, and detail their role in security architectures, e-commerce, e-cash etc. Precise characterizations of key concepts in information security, such as confidentiality, authentication and integrity are introduced and a range of tools and techniques are described which will ensure that a protocol guarantees certain security services under appropriate assumptions.Modeling and Analysis of Security Protocols provides: An in-depth discussion of the nature and role of security protocols and their vulnerabilities. A rigorous framework in which security protocols and properties can be defined in detail. An understanding of the tools and techniques used to design and evaluate security protocols.