Abstract
Epistemic logic has, in the past few decades, grown beyond its origins in philosophy, to be embraced in several other disciplines, including economics, linguistics and computer science. Within computer science, its application can be found in several subdisciplines: artificial intelligence, distributed computing and computer security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Burrows M., Abadi M., and Needham R. M. A logic of authentication. ACM Trans. Comput. Syst., 81: 18–36, 1990.
Cimatti A., Clarke E. M., Giunchiglia E., Pistore M., Roveri M., Sebastiani R., and Tachella A. NuSMV 2: An open source toolkit for symbolic model checking. In Proc. Int. Conf on Computer Aided Verification (CAV’02), pages 27–31, 2002.
Cohen M., and Dam M. A completeness result for ban logic. In Proc. Methods for Modalities 4, pages 121–132, 2005.
Cohen M., and Dam M. Logical omniscience in the semantics of ban logics. In Proc. Found. Comp. Sci., pages 121–132, 2005.
Clarke E. M., Grumberg O., and Peled D. A. Model Checking. MIT Press, 2000.
Chaum D. The dining cryptographers problem: Unconditional sender and recipient untraceability, J. Cryptology, 11: 65–75, 1988.
Emerson E. A., and Clarke E. M. Using branching time logic to synthesize synchronization skeletons, Sci. Comput. Program, 2: 241–266, 1982.
Engelhardt K., van der Meyden R., and Su K. Modal logics with a hierarchy of local propositional quantifiers. In P. Balbiani, N. Suzuki, F. Wolter, and M. Zakharyaschev, editors, Advances in Modal Logic, vol. 4, pages 9–30. World Scientific, 2003.
Fagin R., Halpern J. Y., Moses Y., and Vardi M. Y. Reasoning about Knowledge. MIT Press, Cambridge, MA, 1995.
Gammie P., and van der Meyden R. Mck: Model checking the logic of knowledge. In Proc. Comp. Aided Verification, CAV’04, pages 479–483, 2004.
Halpern J. Y., Moses Y., and Vardi M. Y. Algorithmic knowledge. In R. Fagin, editor, Theoretical Aspects of Reasoning about Knowledge: Proc. Fifth Conf., pages 255–266, 1994.
Halpern J. Y., and O’Neill K. Anonymity and information hiding in multiagent systems. In Proc. of the 16th IEEE Computer Security Foundations Workshop, pages 75–88, 2003.
Holzmann G. J. The SPIN Model Checker: Primer and Reference. Addisson-Wesley, 2003.
Halpern J. Y., and Pucella R. Modelling adversaries in a logic for security protocol analysis. In Proc. Formal Aspects of Security, vol. 2629 of Springer LNCS, pages 115–132, 2003.
Madhusudan P. Control and Synthesis of Open Reactive Systems. PhD thesis, University of Madras, November 2001.
Moses Y. Resource-bounded knowledge. In Proc. Conf. on Theoretical Aspects of Reasoning about Knowledge, pages 261–275, 1988.
van der Meyden R. and Vardi M. Y. Synthesis from knowledge-based specifications. In CONCUR’98, 9th International Conf. on Concurrency Theory, Springer LNCS No. 1466, pages 34–49, September 1998.
Manna Z., and Wolper P. Synthesis of communicating processes from temporal logic specifications, ACM Trans. Program. Lang. Syst, 6(1): 68–93, January 1984.
Pnueli A., and Rosner R. On the synthesis of a reactive module. In Proc. 16th ACM Symposium on Principles of Programming Languages, Austin, January 1989.
Pnueli A., and Rosner R. Distributed reactive systems are hard to synthesize. In Proc. 31st IEEE Symposium on Foundation of Computer Science, pages 746–757, 1990.
Ramanujam R., and Suresh S. P. Deciding knowledge properties of security protocols In Proc. Conf. on Theoretical Aspects of Rationality and Knowledge, pages 219–235. ACM Digital Library, 2005.
van der Meyden R., and Wilke T. Synthesis of distributed systems from knowledgebased specifications. In Proc. Concurrency Theory, 16th Int. Conf., CONCUR 2005, pages 562–576, 2005.
Wittbold J. T., and Johnson D. M. Information flow in nondeterministic systems. In Proc. IEEE Symposium on Research in Security and Privacy, pages 144–161, 1990.
Acknowledgements
Work supported by a grant from the Australian Research Council.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media B.V.
About this chapter
Cite this chapter
van der Meyden, R. (2011). Two Applications of Epistemic Logic in Computer Security. In: van Benthem, J., Gupta, A., Parikh, R. (eds) Proof, Computation and Agency. Synthese Library, vol 352. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-0080-2_9
Download citation
DOI: https://doi.org/10.1007/978-94-007-0080-2_9
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-0079-6
Online ISBN: 978-94-007-0080-2
eBook Packages: Humanities, Social Sciences and LawPhilosophy and Religion (R0)