Using interval logics for temporal analysis of security protocols
暂无分享,去创建一个
[1] Catherine A. Meadows,et al. A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..
[2] Michael R. Hansen,et al. An Adequate First Order Interval Logic , 1997, COMPOS.
[3] Anders P. Ravn,et al. Duration Specifications for Shared Processors , 1992, FTRTFT.
[4] Virgil D. Gligor,et al. A Note on the Denial-of-Service Problem , 1983, 1983 IEEE Symposium on Security and Privacy.
[5] Sergio Yovine,et al. KRONOS: a verification tool for real-time systems , 1997, International Journal on Software Tools for Technology Transfer.
[6] Michael R. Hansen,et al. An Approach to Analyzing Availability Properties of Security Protocols , 2003, Nord. J. Comput..
[7] Philip Chan,et al. Duration Calculus Specification of Schedulimg for Tasks with Shared Resources , 1995, ASIAN.
[8] Henrik Pilegaard. Modelling properties of security protocols , 2002 .
[9] Jonathan K. Millen,et al. A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] Thomas Marthedal Rasmussen,et al. Interval logic. Proof theory and theorem proving , 2002 .
[11] Thomas Marthedal Rasmussen,et al. Automated Proof Support for Interval Logics , 2001, LPAR.
[12] Wang Yi,et al. Uppaal in a nutshell , 1997, International Journal on Software Tools for Technology Transfer.
[13] C. A. R. Hoare,et al. A Calculus of Durations , 1991, Inf. Process. Lett..
[14] ProtocolsLi GongSRI InternationalComputer. Fail-Stop Protocols : An Approach to Designing Secure , 1994 .
[15] Thomas A. Henzinger,et al. HYTECH: a model checker for hybrid systems , 1997, International Journal on Software Tools for Technology Transfer.
[16] Virgil D. Gligor,et al. A formal specification and verification method for the prevention of denial of service , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[17] Michael R. Hansen,et al. A Timed Semantics for SDL , 1996, FORTE.
[18] Lawrence C. Paulson,et al. Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.
[19] Chaochen Zhou,et al. Completeness of neighbourhood logic , 2000, J. Log. Comput..
[20] Zohar Manna,et al. A Hardware Semantics Based on Temporal Intervals , 1983, ICALP.
[21] Michael R. Hansen,et al. Duration calculus: Logical foundations , 1997, Formal Aspects of Computing.
[22] Ben C. Moszkowski,et al. A Temporal Logic for Multilevel Reasoning about Hardware , 1985, Computer.