Advertisement

Foundations of Security, Protocols, and Equational Reasoning

Essays Dedicated to Catherine A. Meadows

  • Joshua D. Guttman
  • Carl E. Landwehr
  • José Meseguer
  • Dusko Pavlovic
Book

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11565)

Also part of the Security and Cryptology book sub series (LNSC, volume 11565)

Table of contents

  1. Front Matter
    Pages i-xii
  2. Jon Millen
    Pages 6-7
  3. Paul Syverson
    Pages 8-14
  4. Erin Hanna, Christopher Lynch, David Jaz Myers, Corey Richardson
    Pages 39-53
  5. Matteo Busi, Pierpaolo Degano, Letterio Galletta
    Pages 54-69
  6. Elisavet Kozyri, Owen Arden, Andrew C. Myers, Fred B. Schneider
    Pages 70-88
  7. Vivek Nigam, Carolyn Talcott, Abraão Aires Urquiza
    Pages 89-111
  8. David Basin, Lucca Hirschi, Ralf Sasse
    Pages 112-134
  9. Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer
    Pages 135-155
  10. Andrew William Roscoe, Lei Wang
    Pages 156-166
  11. Jason Castiglione, Dusko Pavlovic, Peter-Michael Seidel
    Pages 167-191
  12. Musab A. Alturki, Tajana Ban Kirigin, Max Kanovich, Vivek Nigam, Andre Scedrov, Carolyn Talcott
    Pages 192-213
  13. Véronique Cortier, Pierrick Gaudry, Stéphane Glondu
    Pages 214-238
  14. Back Matter
    Pages 239-239

About this book

Introduction

This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019.

Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributions authored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.

 

Keywords

authentication computer architecture computer networks cryptographic protocols cryptography data privacy formal security models key management logic and verification network security parallel processing systems program compilers public key cryptography security protocols semantics software engineering software evaluation telecommunication traffic type systems verification

Editors and affiliations

  • Joshua D. Guttman
    • 1
  • Carl E. Landwehr
    • 2
  • José Meseguer
    • 3
  • Dusko Pavlovic
    • 4
  1. 1.Worcester Polytechnic InstituteWorcesterUSA
  2. 2.George Washington UniversityWashingtonUSA
  3. 3.University of IllinoisUrbanaUSA
  4. 4.University of Hawai'iHonoluluUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-19052-1
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-19051-4
  • Online ISBN 978-3-030-19052-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site