Security-related publications
Back to book home page
2000
-
How
to Prevent Type Flaw Attacks on Security Protocols.
-
James Heather, Gavin Lowe, and Steve Schneider, Proceedings of
13th IEEE Computer Security Foundations Workshop, pages 255-268, 2000.
Also available as Department of Mathematics and Computer Science, Technical
Report 2000/2, University of Leicester, 2000.
-
A
Unifying Approach to Data-independence
-
Ranko Lazic and David Nowak, Proceedings of the 11th International Conference
on Concurrency Theory (CONCUR 2000), Lecture Notes in Computer Science.
Springer-Verlag, August 2000.
-
Automating Data Independence
-
Philippa Broadfoot, Gavin Lowe, and Bill Roscoe, Proceedings of European
Symposium on Research in Computer Security, 2000.
-
The successes and failures of behavioural
models
-
Bill Roscoe, Mike Reed, and Richard Forster, In Millenial Perspectives in
Computer Science, Davies, Roscoe, and Woodcock (eds), Palgrave, 2000.
-
May
testing, non-interference, and compositionality.
-
Steve Schneider, First Irish Conference on Mathematical Foundations
of Computer Science and Information Technology, 2000.
-
Analysing
Time Dependent Security Properties in CSP using PVS
-
Neil Evans and Steve Schneider, Proceedings of European Symposium on
Research in Computer Security, 2000.
-
Towards
automatic verification of authentication protocols on an unbounded network
-
James Heather and Steve Schneider, Proceedings of 13th IEEE Computer
Security Foundations Workshop, 2000.
1999
-
Towards
a Completeness Result for Model Checking of Security Protocols.
-
Gavin Lowe, Journal of Computer Security, Volume 7, Numbers
2, 3, pages 89-146, 1999. Earlier versions appeared in Proceedings of 11th
IEEE Computer Security Foundations Workshop, pages 96-105, 1998, and
as Department of Mathematics and Computer Science, Technical Report 1998/6,
University of Leicester, 1998.
-
Simplifying
Transformations for Security Protocols.
-
Mei Lin Hui and Gavin Lowe, Proceedings of 12th IEEE Computer Security
Foundations Workshop, pages 32-43, 1999. Also available as Department
of Mathematics and Computer Science, Technical Report 1999/1, University
of Leicester, 1999.
-
Defining
Information Flow.
-
Gavin Lowe, Department of Mathematics and Computer Science, Technical
Report 1999/3, University of Leicester, 1999.
-
Analyzing
a Library of Security Protocols using Casper and FDR.
-
Gavin Lowe, Ben Donovan and Paul Norris, Proceedings of the Workshop
on Formal Methods and Security Protocols, 1999. Some of the Casper
scripts are available here
(gzipped, tarred directory).
-
Data
Independence with Generalised Predicate Symbols
-
Ranko Lazic and Bill Roscoe, Proceedings of the International Conference
on Parallel and Distributed Processing Techniques and Applications
(PDPTA '99), June 28 - July 1 1999, Las Vegas, Nevada, USA. Volume I, 319-325.
Published by CSREA Press.
-
Proving
security protocols with model checkers by data independence techniques
-
Bill Roscoe and Philippa Broadfoot, Journal of Computer Security,
Special Issue CSFW11, 1999, p 147. Published by IOS Press.
-
What is intransitive interference?
-
Bill Roscoe and Michael Goldsmith, Proceedings of 12th IEEE Computer
Security Foundations Workshop, 1999.
-
Proceedings
of the DERA/RHUL Workshops on Secure Architectures and Information Flow
-
Peter Ryan and Steve Schneider, 1999.
-
Process
algebra and non-interference
-
Peter Ryan and Steve Schneider, Proceedings of 12th IEEE Computer Security
Foundations Workshop, 1999.
-
Non-interference
Properties for Nondeterministic Processes
-
Richard Forster, D.Phil. thesis, Oxford University Computing Laboratory,
1999.
-
A
Semantic Study of Data Independence with Applications to Model Checking
-
Ranko Lazic, D.Phil. thesis, Oxford University Computing Laboratory, 1999.
1998
-
Casper:
A Compiler for the Analysis of Security Protocols.
-
Gavin Lowe, Proceedings of 10th IEEE Computer Security Foundations
Workshop, 1997. Also in Journal of Computer Security, Volume
6, pages 53-84, 1998.
-
Proving security protocols with model checkers
by data independence techniques.
-
Bill Roscoe, Proceedings of 11th IEEE Computer Security Foundations
Workshop, 1998.
-
An attack on a recursive authentication protocol: A cautionary tale.
-
Peter Ryan and Steve Schneider, Information Processing Letters 65
(1998), 7-10.
-
Formal
Analysis of an Non-Repudiation Protocol
-
Steve Schneider, Proceedings of 11th IEEE Computer Security Foundations
Workshop, 1998.
1997
-
A
Hierarchy of Authentication Specifications.
-
Gavin Lowe, Proceedings of 10th IEEE Computer Security Foundations
Workshop, 1997.
-
Also available as Department of Mathematics and Computer Science Technical
Report 1996/33, University of Leicester, 1996.
-
Using
CSP to Detect Errors in the TMN Protocol.
-
Gavin Lowe and Bill Roscoe, IEEE Transactions on Software Engineering,
volume 23, number 10, 1997.
-
A preliminary version is available as Department of Mathematics and Computer
Science Technical
Report 1996/34, University of Leicester, 1996.
-
A
Family of Attacks upon Authentication Protocols.
-
Gavin Lowe, Department of Mathematics and Computer Science, Technical
Report 1997/5, University of Leicester, 1997.
-
Using
a PVS Embedding of CSP to Verify Authentication Protocols.
-
Bruno Dutertre and Steve Schneider, Proceedings of Theorem Proving in
Higher Order Logics (TPHOLs) 1997.
-
CSP,
PVS and a Recursive Authentication Protocol.
-
Jeremy Bryans and Steve Schneider, Proceedings of DIMACS Workshop on
Formal Verification of Security Protocols, 1997.
-
Verifying
Authentication Protocols with CSP.
-
Steve Schneider, Proceedings of 10th IEEE Computer Security Foundations
Workshop, 1997.
1996
-
Breaking
and Fixing the Needham-Schroeder Public-Key Protocol using FDR.
-
Gavin Lowe, Tools and Algorithms for the Construction and Analysis
of Systems, Margaria and Steffen (eds.), volume 1055 of Lecture Notes
in Computer Science, Springer Verlag, pages 147-166, 1996.
-
Also in Software Concepts and Tools, 17:93-102, 1996.
-
Some
New Attacks upon Security Protocols.
-
Gavin Lowe, Proceedings of 9th IEEE Computer Security Foundations
Workshop, 1996.
-
Intensional specifications of security protocols
-
Bill Roscoe, Proceedings of 9th IEEE Computer Security Foundations
Workshop, 1996.
-
Security
Properties and CSP.
-
Steve Schneider, Proceedings of IEEE Computer Society Symposium
on Security and Privacy, Oakland, 1996.
-
Using
CSP for Protocol Analysis: the Needham-Schroeder Public-Key Protocol
-
Steve Schneider, Royal Holloway Technical Report CSD-TR-96-14.
-
CSP
and anonymity
-
Steve Schneider and Abraham Sidiropoulos, Proceedings of European Symposium
on Research in Computer Security, LNCS 1146, 1996.
1995
-
CSP and determinism in security modelling
-
Bill Roscoe, Proceedings of IEEE Computer Society Symposium on
Security and Privacy, Oakland, 1995.
-
Modelling and verifying key-exchange protocols
using CSP and FDR
-
Bill Roscoe, Proceedings of 8th IEEE Computer Security Foundations
Workshop, 1995.
Back to book home page
Last updated by Steve Schneider: November
15, 2000