Automated Reasoning for Security Protocol Analysis

[1]  Paolo Mancarella,et al.  The KGP Model of Agency , 2004, ECAI.

[2]  Robert Demolombe,et al.  Reasoning About Trust: A Formal Logical Framework , 2004, iTrust.

[3]  John Mylopoulos,et al.  Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning , 2004, iTrust.

[4]  Timothy W. Finin,et al.  A Policy Based Approach to Security for the Semantic Web , 2003, SEMWEB.

[5]  Paolo Torroni,et al.  Minimally intrusive negotiating agents for resource sharing , 2003, IJCAI.

[6]  Paolo Torroni,et al.  An Abductive Logic Programming Architecture for Negotiating Agents , 2002, JELIA.

[7]  Bert Van Nuffelen,et al.  A-System: Problem Solving through Abduction , 2001, IJCAI.

[8]  Paolo Torroni,et al.  Dialogues for Negotiation: Agent Varieties and Dialogue Sequences , 2001, ATAL.

[9]  Francesca Toni,et al.  Abduction with Negation as Failure for Active and Reactive Rules , 1999, AI*IA.

[10]  Robert A. Kowalski,et al.  From logic programming towards multi‐agent systems , 1999, Annals of Mathematics and Artificial Intelligence.

[11]  Francesca Toni,et al.  Combining Introspection and Communication with Rationality and Reactivity in Agents , 1998, JELIA.

[12]  Robert A. Kowalski,et al.  The Iff Proof Procedure for Abductive Logic Programming , 1997, J. Log. Program..

[13]  Paolo Mancarella,et al.  Abductive Logic Programming with CIFF: Implementation and Applications , 2004 .

[14]  Timothy W. Finin,et al.  Communications - Trust-Based Security in Pervasive Computing Environments , 2001, Computer.

[15]  Antonis C. Kakas,et al.  The role of abduction in logic programming , 1998 .