Verifying security protocols as planning in logic programming.
Luigia Carlucci AielloFabio MassacciPublished in: ACM Trans. Comput. Log. (2001)
Keyphrases
- logic programming
- security protocols
- logic programs
- deductive databases
- logic programming language
- knowledge representation
- nonmonotonic reasoning
- programming language
- knowledge base
- answer set programming
- computational logic
- reasoning about actions
- stable models
- key management
- default logic
- constraint logic programming
- general purpose
- security mechanisms
- answer sets
- power consumption
- software engineering
- data model
- database systems