Proving Trust Locally
暂无分享,去创建一个
[1] Ronald Fagin,et al. Reasoning about knowledge , 1995 .
[2] Glenn H. MacEwen,et al. A logic for reasoning about security , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.
[3] S. Shapiro,et al. Foundations Without Foundationalism: A Case for Second-Order Logic. , 1994 .
[4] Gottlob Frege,et al. Begriffsschrift, eine der arithmetischen nachgebildete Formelsprache des reinen Denkens , 1879 .
[5] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[6] Anders Moen Hagalisletto,et al. Attacks are Protocols Too , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[7] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[8] Ronald Fagin,et al. Belief, Awareness, and Limited Reasoning. , 1987, Artif. Intell..
[9] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[10] A. M. Hagalisletto,et al. A FORMAL LANGUAGE FOR SPECIFYING SECURITY PROPERTIES , 2004 .
[11] Mads Dam,et al. Logical Omniscience in the Semantics of BAN Logic , 2003 .
[12] Martín Abadi,et al. A calculus for access control in distributed systems , 1991, TOPL.
[13] Frédéric Cuppens,et al. Expression of confidentiality policies with deontic logic , 1994 .