Planning Attacks to Security Protocols: Case Studies in Logic Programming.
Luigia Carlucci AielloFabio MassacciPublished in: Computational Logic: Logic Programming and Beyond (2002)
Keyphrases
- logic programming
- security protocols
- case study
- logic programs
- cryptographic algorithms
- nonmonotonic reasoning
- logic programming language
- security mechanisms
- deductive databases
- knowledge representation
- knowledge base
- answer set programming
- answer sets
- default logic
- computational logic
- constraint logic programming
- programming language
- reasoning about actions
- cryptographic protocols
- stable models
- rfid tags
- disjunctive logic programming
- key management
- databases
- defeasible argumentation
- intrusion detection system
- knowledge management
- object oriented
- artificial intelligence