{"id":"https://openalex.org/W2067797538","doi":"https://doi.org/10.1016/s1571-0661(04)00243-9","title":"Abstract Interpretation for Proving Secrecy Properties in Security Protocols","display_name":"Abstract Interpretation for Proving Secrecy Properties in Security Protocols","publication_year":2003,"publication_date":"2003-01-01","ids":{"openalex":"https://openalex.org/W2067797538","doi":"https://doi.org/10.1016/s1571-0661(04)00243-9","mag":"2067797538"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)00243-9","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/s1571-0661(04)00243-9","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071452551","display_name":"Kamel Adi","orcid":"https://orcid.org/0000-0003-2869-0333"},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"K. Adi","raw_affiliation_strings":["LSFM Research Group, Computer Science Departement, Science and Engineering Faculty, Laval University, Sainte-Foy, Qc, Canada"],"affiliations":[{"raw_affiliation_string":"LSFM Research Group, Computer Science Departement, Science and Engineering Faculty, Laval University, Sainte-Foy, Qc, Canada","institution_ids":["https://openalex.org/I43406934"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028605138","display_name":"Mourad Debbabi","orcid":"https://orcid.org/0000-0003-3015-3043"},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"M. Debbabi","raw_affiliation_strings":["LSFM Research Group, Computer Science Departement, Science and Engineering Faculty, Laval University, Sainte-Foy, Qc, Canada"],"affiliations":[{"raw_affiliation_string":"LSFM Research Group, Computer Science Departement, Science and Engineering Faculty, Laval University, Sainte-Foy, Qc, Canada","institution_ids":["https://openalex.org/I43406934"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.59,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.628391,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":66,"max":70},"biblio":{"volume":"55","issue":"1","first_page":"25","last_page":"50"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/abstract-interpretation","display_name":"Abstract Interpretation","score":0.5374764}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.81980526},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.78253555},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.7717538},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7630288},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.65253055},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.6363458},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5764677},{"id":"https://openalex.org/C2780654840","wikidata":"https://www.wikidata.org/wiki/Q333341","display_name":"Abstract interpretation","level":2,"score":0.5374764},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.47736216},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.46997327},{"id":"https://openalex.org/C156325763","wikidata":"https://www.wikidata.org/wiki/Q1930895","display_name":"Operational semantics","level":3,"score":0.46290836},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.453714},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.44811824},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22762978},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)00243-9","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)00243-9","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.8,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":39,"referenced_works":["https://openalex.org/W129783273","https://openalex.org/W1501891174","https://openalex.org/W1525779663","https://openalex.org/W158873283","https://openalex.org/W1607134907","https://openalex.org/W173723324","https://openalex.org/W1870018393","https://openalex.org/W1891950217","https://openalex.org/W1893243138","https://openalex.org/W1923324835","https://openalex.org/W1966995096","https://openalex.org/W1991305430","https://openalex.org/W1994676271","https://openalex.org/W2048286373","https://openalex.org/W2055632964","https://openalex.org/W2073158515","https://openalex.org/W2077025369","https://openalex.org/W2078793962","https://openalex.org/W2087306890","https://openalex.org/W2102922499","https://openalex.org/W2105061375","https://openalex.org/W2106857693","https://openalex.org/W2110423379","https://openalex.org/W2120600989","https://openalex.org/W2124679171","https://openalex.org/W2128932399","https://openalex.org/W2134923006","https://openalex.org/W2140464851","https://openalex.org/W2150682469","https://openalex.org/W2154568476","https://openalex.org/W2155032609","https://openalex.org/W2161093351","https://openalex.org/W2168899388","https://openalex.org/W2169216703","https://openalex.org/W2169908972","https://openalex.org/W2477524444","https://openalex.org/W3022746997","https://openalex.org/W4213148345","https://openalex.org/W4244209731"],"related_works":["https://openalex.org/W57958781","https://openalex.org/W4205636420","https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W2496342316","https://openalex.org/W2361781577","https://openalex.org/W2141019415","https://openalex.org/W1971522943","https://openalex.org/W1554274402","https://openalex.org/W1488313539"],"abstract_inverted_index":{"A":[0],"cryptographic":[1],"protocol":[2,19],"is":[3,42,96],"a":[4,37,77,87,101],"distributed":[5],"program":[6],"that":[7],"can":[8],"be":[9],"executed":[10],"by":[11],"several":[12,15],"actors.":[13],"Since":[14],"runs":[16],"of":[17,27,50],"the":[18,21,48,60,84],"within":[20],"same":[22],"execution":[23,63],"are":[24,29],"allowed,":[25],"models":[26],"cryptoprotocols":[28],"often":[30],"infinite.":[31],"Sometimes,":[32],"for":[33,83,90,104],"verification":[34],"purposes,":[35],"only":[36],"finite":[38,74],"and":[39,55],"approximated":[40],"model":[41],"needed.":[43],"For":[44],"this,":[45],"we":[46,56,70],"consider":[47],"problem":[49],"computing":[51],"such":[52],"an":[53,65,72,79],"approximation":[54],"propose":[57],"to":[58,99],"simulate":[59],"required":[61],"partial":[62],"in":[64,107],"abstract":[66,73,80,94],"level.":[67],"More":[68],"precisely,":[69],"define":[71],"category":[75],"G":[76],"as":[78],"game":[81],"semantics":[82,95],"SPC":[85],"calculus,":[86],"dedicated":[88],"calculus":[89],"security":[91,108],"protocols.":[92,109],"The":[93],"then":[97],"used":[98],"build":[100],"decision":[102],"procedure":[103],"secrecy":[105],"correctness":[106]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2067797538","counts_by_year":[],"updated_date":"2025-01-19T02:40:55.615201","created_date":"2016-06-24"}