Should We Prove Security Policies Correct?
暂无分享,去创建一个
[1] Frédéric Cuppens,et al. Specifying a security policy: a case study , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[2] Fabio Massacci,et al. Verifying the SET registration protocols , 2003, IEEE J. Sel. Areas Commun..
[3] Giampaolo Bella. Inductive Verification of Smart Card Protocols , 2003, J. Comput. Secur..
[4] Laurence Cholvy. Checking regulation consistency by using SOL-resolution , 1999, ICAIL '99.
[5] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[6] Lawrence Charles Paulson,et al. Isabelle: A Generic Theorem Prover , 1994 .
[7] Giampaolo Bella. Interactive simulation of security policies , 2002, SAC '02.
[8] Fabio Massacci,et al. Formal Verification of Cardholder Registration in SET , 2000, ESORICS.
[9] Lawrence C. Paulson,et al. Mechanical Proofs about a Non-repudiation Protocol , 2001, TPHOLs.
[10] Frédéric Cuppens,et al. Analyzing consistency of security policies , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).