ACM Transactions on Computer Systems (TOCS)
ML for the working programmer
PKI Seeks a Trusting Relationship
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
An Axiomatic Basis for Reasoning about Trust in PKIs
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
On Unifying Some Cryptographic Protocol Logics
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Trust in Secure Communication Systems - The Concept, Representations, and Reasoning Techniques
AI '02 Proceedings of the 15th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
AI '02 Proceedings of the 15th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Formalising theories of trust for authentication protocols
Information Systems Frontiers
Modal tableaux for verifying stream authentication protocols
Autonomous Agents and Multi-Agent Systems
Theories of Trust for Communication Protocols
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Analysis of authentication protocols in agent-based systems using labeled tableaux
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on cybernetics and cognitive informatics
Managing theories of trust in agent based systems
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
A temporalised belief logic for specifying the dynamics of trust for multi-agent systems
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
Hi-index | 0.03 |
This paper investigates foundations for the description of, and reasoning about, trust in secure digital communication. We propose a logic, called the Typed Modal Logic (TML), which extends first-order logic with typed variables and modal operators to express agent beliefs. Based on the logic, the theory of trust for a specific security system can be established. Such trust theories provide a foundation for reasoning about trust in digital communication.