EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Project: Account: Accountability in Electronic Commerce Protocols
Home Policy Brochure Browse Search User Area Contact Help

2007

Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262 *** ISI Impact 1,279 ***

2006

Abadi, M. and Corin, R.J. and Fournet, C. (2006) Computational Secrecy by Typing for the Pi Calculus. In: The Fourth ASIAN Symposium on Programming Languages and Systems (APLAS 2006), 8 Nov - 10 Nov 2006, Sydney, Australia. pp. 253-269. Lecture Notes in Computer Science 4279. Springer Verlag. ISBN 3-540-48937-1
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. Technical Report TR-CTIT-06-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2006) A Logic for Constraint-based Security Protocol Analysis. In: IEEE Symposium on Security and Privacy, 21-25 May 2006, Oakland, US. pp. 155-168. IEEE Computer Society. ISBN 0-7695-2574-1
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-06-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-07-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Delzanno, G. and Etalle, S. and Gabbrielli, M. (2006) Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory and Practice of Logic Programming, 6 (3). pp. 225-226. ISSN 1471-0684 *** ISI Impact 0,952 ***

2005

Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2005) An Audit Logic for Accountability. In: 6th International Workshop on Policies for Distributed Systems & Networks (POLICY 2005), 6-8 Jun 2005, Stockholm, Sweden. pp. 34-43. IEEE Computer Society. ISBN 0-7695-2265-3
Cederquist, J.G. and Corin, R.J. and Torabi Dashti, M. (2005) On the quest for impartiality: Design and analysis of a Fair Non-repudiation protocol. In: 7th International Conference on Information and Communications Security, ICICS 2005, 10-13 Dec 2005, Beijing, China. pp. 27-39. Lecture Notes in Computer Science 3783. Springer-Verlag. ISBN 3-540-30934-9
Cederquist, J.G. and Torabi Dashti, M. (2005) An Intruder Model for Verifying Termination in Security Protocols. Technical Report TR-CTIT-05-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2004

Barthe, G. and Cederquist, J.G. and Tarento, S. (2004) A Machine-Checked Formalization of the Generic Model and the Random Oracle Model. In: 2nd International Joint Conference on Automated Reasoning, IJCAR , 4-8 Jul 2004, Cork, Ireland. pp. 385-399. Lecture Notes in Computer Science 3097. Springer-Verlag. ISBN 3-540-22345-2
Cederquist, J.G. and Torabi Dashti, M. (2004) Formal Analysis of a Fair Payment Protocol. In: 2nd International Workshop on Formal Aspect of Security and Trust (FAST), 22-27 Aug 2004, Toulouse, France. pp. 41-54. IFIP International Federation for Information Processing 173. Kluwer Academic Publishers. ISBN 9780387240503

2003

Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2003) A Trace Logic for Local Security Properties. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003), December 14 2003, Mumbai, India. pp. 129-143. Electronic Notes in Theoretical Computer Science 118. Elsevier. ISSN 1571-0661

2002

Corin, R.J. and Etalle, S. (2002) An Improved Constraint-based system for the verification of security protocols. In: 9th Int. Static Analysis Symp. (SAS), Madrid, Spain. pp. 239-265. Springer-Verlag. ISBN 3-540-44235-9

2001

Delzanno, G. and Etalle, S. (2001) Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. In: 11th Int. Logic Based Program Synthesis and Transformation (LOPSTR), Paphos, Greece. pp. 76-90. Springer-Verlag. ISSN 0302-9743 ISBN 3-540-43915-3