Access the full text.
Sign up today, get DeepDyve free for 14 days.
J. McCarthy (1987)
SOME PHILOSOPHICAL PROBLEMS FROM THE STANDPOINT OF ARTI CIAL INTELLIGENCEMachine intelligence
Bernard Zajac (1994)
Applied cryptography: Protocols, algorithms, and source code in CComputers & Security, 13
GOLLMANN, D. (1996)
What do we mean by entity authentication? In Proceedings of the 15th IEEE Symposium on Security and Privacy (SSP'96)IEEE Computer Society Press
SYVERSON VAN OORSCHOT, P. C. (1994)
On unifying some cryptographic protocols logicsProceedings of the 13th IEEE Symposium on Security and Privacy (SSP'94). IEEE Computer Society Press.
P. Syverson, P. Oorschot (1994)
On unifying some cryptographic protocol logicsProceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy
J.C. Mitchell, Mark Mitchell, U. Stern (1997)
Automated Analysis of Cryptographic Protocols Using Mur '
LOWE, G. (1996)
Some new attacks upon security protocolsProceedings of the Ninth IEEE Computer Security Foundations Workshop (CSFW'96). IEEE Computer Society Press
Yannis Dimopoulos, Bernhard Nebel, Jana Koehler (1997)
Encoding Planning Problems in Nonmonotonic Logic Programs
P. Ryan, Steve Schneider (1998)
An Attack on a Recursive Authentication Protocol. A Cautionary TaleInf. Process. Lett., 65
M. Gelfond, Vladimir Lifschitz (1988)
The Stable Model Semantics for Logic Programming
B. Schneier (1995)
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
LOWE, G. (1998)
Casper: Acompiler for the analysis of security protocolsJ. Comput. Security, 6
P. Syverson, C. Meadows (1996)
A formal language for cryptographic protocol requirementsDesigns, Codes and Cryptography, 7
(2001)
ACM Transactions on Computational Logic
D. Gollmann (1996)
What do we mean by entity authentication?Proceedings 1996 IEEE Symposium on Security and Privacy
S. Brackin, C. Meadows, J. Millen (1999)
CAPSL interface for the NRL Protocol AnalyzerProceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)
C. Meadows (1996)
The NRL Protocol Analyzer: An OverviewJ. Log. Program., 26
Massacci
G. Bella, Lawrence Paulson (1998)
Kerberos Version 4: Inductive Analysis of the Secrecy Goals
M. Abadi, M. Tuttle (1991)
A Semantics for a Logic of Authentication
C. Meadows, P. Syverson (1998)
A Formal Specification of Requirements for Payment Transactions in the SET Protocol
John Clark, J. Jacob (1997)
A survey of authentication protocol literature: Version 1.0
Lawrence Paulson (2021)
The Inductive Approach to Verifying Cryptographic ProtocolsArXiv, abs/2105.06319
E. Clarke, S. Jha (1998)
A Machine Checkable Logic of Knowledge forSpecifying Security Properties of ElectronicCommerce Protocols
Steve Schneider (1997)
Verifying authentication protocols with CSPProceedings 10th Computer Security Foundations Workshop
NIEMELA, I. (1999)
Logic programs with stable model semantics as a constraint programming paradigmAnnals Math. Artif. Intell., 25
G. Lowe (1996)
Some new attacks upon security protocolsProceedings 9th IEEE Computer Security Foundations Workshop
Sam Steel, Rachid Alami (1997)
Recent Advances in AI Planning, 1348
M. Burrows, M. Abadi, R. Needham (1990)
A logic of authenticationACM Trans. Comput. Syst., 8
M. Burrows, M. Abadi, R. Needham (1989)
A logic of authenticationProceedings of the Royal Society of London. A. Mathematical and Physical Sciences, 426
LORENZON, L. (2000)
Un traduttore da CASPER ad AL SPM.S. Thesis
K. Apt (1990)
Logic Programming
G. Lowe (1997)
Casper: a compiler for the analysis of security protocolsProceedings 10th Computer Security Foundations Workshop
I. Cervesato, N. Durgin, P. Lincoln, John Mitchell, A. Scedrov (1999)
A meta-notation for protocol analysisProceedings of the 12th IEEE Computer Security Foundations Workshop
G. Bella, F. Massacci, Lawrence Paulson, Piero Tramontano (2000)
Formal verification of card-holder registration in SET
I. Cervesato, N. Durgin, M. Kanovich, A. Scedrov (2000)
Interpreting Strands in Linear Logic
Henry Kautz, B. Selman (1992)
Planning as Satisfiability
G. Lowe (1997)
A hierarchy of authentication specificationsProceedings 10th Computer Security Foundations Workshop
John Mitchell, Mark Mitchell, U. Stern (1997)
Automated analysis of cryptographic protocols using Mur/spl phi/Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
R. Reiter (1991)
The Frame Problem in the Situation Calculus: A Simple Solution (Sometimes) and a Completeness Result for Goal Regression
D. Dolev, A. Yao (1983)
On the security of public key protocols22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)
B. Schneier (1996)
Applied cryptography : protocols, algorithms, and source codein C
NIEMELA SIMMONS, P. (1997)
Smodels - an implementation of stable model and well-founded semantics for normal logic programsProceedings of the 4th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR'97). Lecture Notes in Artificial Intelli-gence
N. Asokan, M. Schunter, Michael Waidner (1997)
Optimistic protocols for fair exchange
M. Abadi, M. Tuttle (1991)
A semantics for a logic of authentication (extended abstract)
DOLEV YAO, A. (1983)
On the security of public key protocolsIEEE Trans. Inf. Theory IT-, 30
I. Cervesato, N. Durgin, John Mitchell, P. Lincoln, A. Scedrov (2000)
Relating strands and multiset rewriting for security protocol analysisProceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
I. Niemelä, P. Simons (1997)
Smodels - An Implementation of the Stable Model and Well-Founded Semantics for Normal LP
SCHNEIDER, S. (1998)
Verifying authentication protocols in CSPIEEE Trans. Softw. Eng., 24
L. Aiello, F. Massacci (2002)
Planning Attacks to Security Protocols: Case Studies in Logic Programming
L. Aiello, F. Massacci (2000)
An executable specification language for planning attacks to security protocolsProceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
We illustrate ALSP (Action Language for Security Protocol), a declarative executable specification language for planning attacks to security protocols. ALSP is based on logic programming with negation as failure, and with stable model semantics. In ALSP we can give a declarative specification of a protocol with the natural semantics of send and receive actions which can be performed in parallel. By viewing a protocol trace as a plan to achieve a goal, attacks are (possibly parallel) plans achieving goals that correspond to security violations. Building on results from logic programming and planning, we map the existence of an attack into the existence of a model for the protocol that satisfies the specification of an attack. We show that our liberal model of parallel actions can adequately represent the traditional Dolev-Yao trace-based model used in the formal analysis of security protocols. Specifications in ALSP are executable, as we can automatically search for attacks via an efficient model generator (smodels), implementing the stable model semantics of normal logic programs.
ACM Transactions on Computational Logic (TOCL) – Association for Computing Machinery
Published: Oct 1, 2001
Keywords: AI planning
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.