ACM Transactions on Computer Systems (TOCS)
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
An automatic search for security flaws in key management schemes
Computers and Security
Extending cryptographic logics of belief to key agreement protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
A calculus for cryptographic protocols
Information and Computation
First-order modal logic
Executing specifications of distributed computations with Chronolog(MC)
SAC '96 Proceedings of the 1996 ACM symposium on Applied Computing
Using encryption for authentication in large networks of computers
Communications of the ACM
Athena: a novel approach to efficient automatic security protocol analysis
Journal of Computer Security
On the characterisation of a trusting agent - aspects of a formal approach
Trust and deception in virtual societies
Primitives for authentication in process algebras
Theoretical Computer Science
Journal of Logic, Language and Information
Trust in Secure Communication Systems - The Concept, Representations, and Reasoning Techniques
AI '02 Proceedings of the 15th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Logical Foundations for Reasoning about Trust in Secure Digital Communication
AI '01 Proceedings of the 14th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Formal Semantics for Authentication Logics
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Sound Logic for Analysing Electronic Commerce Protocols
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Labelled Tableaux for Multi-Modal Logics
TABLEAUX '95 Proceedings of the 4th International Workshop on Theorem Proving with Analytic Tableaux and Related Methods
Synthesis of Self-Testing Finite State Machines from High-Level Specifications
Proceedings of the IEEE International Test Conference on Test and Design Validity
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Model Checking for Combined Logics with an Application to Mobile Systems
Automated Software Engineering
Using Temporal Logics of Knowledge in the Formal Verification of Security Protocols
TIME '04 Proceedings of the 11th International Symposium on Temporal Representation and Reasoning
Specifying Agent Beliefs for Authentication Systems
ECUMN '07 Proceedings of the Fourth European Conference on Universal Multiservice Networks
Formalising theories of trust for authentication protocols
Information Systems Frontiers
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
Modal tableaux for verifying stream authentication protocols
Autonomous Agents and Multi-Agent Systems
Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
Electronic Notes in Theoretical Computer Science (ENTCS)
A temporalised belief logic for specifying the dynamics of trust for multi-agent systems
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
Hierarchical Kohonenen net for anomaly detection in network security
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
An Automatically Tuning Intrusion Detection System
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Trust management and trust theory revision
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Hi-index | 0.00 |
The study of multiagent systems (MASs) focuses on systems in which many intelligent agents interact with each other using communication protocols. For example, an authentication protocol is used to verify and authorize agents acting on behalf of users to protect restricted data and information. After authentication, two agents should be entitled to believe that they are communicating with each other and not with intruders. For specifying and reasoning about the security properties of authentication protocols, many researchers have proposed the use of belief logics. Since authentication protocols are designed to operate in dynamic environments, it is important to model the evolution of authentication systems through time in a systematic way. We advocate the systematic combinations of logics of beliefs and time for modeling and reasoning about evolving agent beliefs in MASs. In particular, we use a temporal belief logic called TML+ for establishing trust theories for authentication systems and also propose a labeled tableau system for this logic. To illustrate the capabilities of TML+, we present trust theories for several well-known authentication protocols, namely, the Lowe modified wide-mouthed frog protocol, the amended Needham-Schroeder symmetric key protocol, and Kerberos. We also show how to verify certain security properties of those protocols. With the logic TML+ and its associated modal tableaux, we are able to reason about and verify authentication systems operating in dynamic environments.