Analyzing security protocols with secrecy types and logic programs.
Martín AbadiBruno BlanchetPublished in: J. ACM (2005)
Keyphrases
- logic programs
- security protocols
- logic programming
- security properties
- answer sets
- key management
- stable models
- answer set programming
- fixpoint
- prolog programs
- strong equivalence
- normal logic programs
- partial deduction
- stable model semantics
- computational properties
- security mechanisms
- functional programs
- object oriented
- loop formulas
- term rewriting systems
- monotonicity constraints
- security analysis
- security requirements
- model checking
- artificial intelligence