Susan Older: Selected Publications
Copyright notice: The papers and articles referenced below have been
provided by the contributing authors as a means to ensure timely dissemination
of scholarly and technical work on a non-commercial basis. Copyright and all
rights therein are maintained by the authors or by other copyright holders,
notwithstanding that they have offered their works here electronically. It is
understood and expected that all persons copying this information will adhere
to the terms and constraints invoked by each author's copyright.
- The following article is a survey paper, describing how different
formal methods are appropriate for reasoning about different aspects of the
same security protocol (in this case, the Needham-Schroeder key-exchange
protocol).
Susan Older and Shiu-Kai Chin, ``Formal Methods for Assuring Security
of Protocols,'' The Computer Journal, Special Issue on Formal
Methods in Computing, Volume 45, pages 46--54, January 2002.
(Available as Postscript or PDF.)
-
Thumrongsak Kosiyatrakul, Susan Older, Polar Humenn, and
Shiu-Kai Chin,
``Implementing a Calculus for Distributed Access Control in Higher Order
Logic and HOL,'' (invited paper), Computer Network Security: Second
International Workshop on Mathematical Methods, Models, and
Architectures for Computer Network Security, edited by
V. Gorodetsky, L. Popyack, and V. Skormin, Lecture Notes in Computer
Science, Volume 2776, 2003. (Available as PDF.)
-
Thumrongsak Kosiyatrakul, Susan Older, and Shiu-Kai
Chin, ``A Modal Logic for Role-Based Access Control,'' Computer Network
Security: Third International Workshop on Mathematical Methods, Models, and
Architectures for Computer Network Security, edited by V. Gorodetsky,
L. Popyack, and V. Skormin, Lecture Notes in Computer Science, Volume 3685,
2005. (Available as PDF.)
Last modified: Tue 25 Jul 2006
Susan Older / sueo AT ecs.syr.edu