Skip to main content

Two Applications of Epistemic Logic in Computer Security

  • Chapter
  • First Online:
Proof, Computation and Agency

Part of the book series: Synthese Library ((SYLI,volume 352))

Abstract

Epistemic logic has, in the past few decades, grown beyond its origins in philosophy, to be embraced in several other disciplines, including economics, linguistics and computer science. Within computer science, its application can be found in several subdisciplines: artificial intelligence, distributed computing and computer security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Burrows M., Abadi M., and Needham R. M. A logic of authentication. ACM Trans. Comput. Syst., 81: 18–36, 1990.

    Article  Google Scholar 

  2. Cimatti A., Clarke E. M., Giunchiglia E., Pistore M., Roveri M., Sebastiani R., and Tachella A. NuSMV 2: An open source toolkit for symbolic model checking. In Proc. Int. Conf on Computer Aided Verification (CAV’02), pages 27–31, 2002.

    Google Scholar 

  3. Cohen M., and Dam M. A completeness result for ban logic. In Proc. Methods for Modalities 4, pages 121–132, 2005.

    Google Scholar 

  4. Cohen M., and Dam M. Logical omniscience in the semantics of ban logics. In Proc. Found. Comp. Sci., pages 121–132, 2005.

    Google Scholar 

  5. Clarke E. M., Grumberg O., and Peled D. A. Model Checking. MIT Press, 2000.

    Google Scholar 

  6. Chaum D. The dining cryptographers problem: Unconditional sender and recipient untraceability, J. Cryptology, 11: 65–75, 1988.

    Google Scholar 

  7. Emerson E. A., and Clarke E. M. Using branching time logic to synthesize synchronization skeletons, Sci. Comput. Program, 2: 241–266, 1982.

    Article  Google Scholar 

  8. Engelhardt K., van der Meyden R., and Su K. Modal logics with a hierarchy of local propositional quantifiers. In P. Balbiani, N. Suzuki, F. Wolter, and M. Zakharyaschev, editors, Advances in Modal Logic, vol. 4, pages 9–30. World Scientific, 2003.

    Google Scholar 

  9. Fagin R., Halpern J. Y., Moses Y., and Vardi M. Y. Reasoning about Knowledge. MIT Press, Cambridge, MA, 1995.

    Google Scholar 

  10. Gammie P., and van der Meyden R. Mck: Model checking the logic of knowledge. In Proc. Comp. Aided Verification, CAV’04, pages 479–483, 2004.

    Google Scholar 

  11. Halpern J. Y., Moses Y., and Vardi M. Y. Algorithmic knowledge. In R. Fagin, editor, Theoretical Aspects of Reasoning about Knowledge: Proc. Fifth Conf., pages 255–266, 1994.

    Google Scholar 

  12. Halpern J. Y., and O’Neill K. Anonymity and information hiding in multiagent systems. In Proc. of the 16th IEEE Computer Security Foundations Workshop, pages 75–88, 2003.

    Google Scholar 

  13. Holzmann G. J. The SPIN Model Checker: Primer and Reference. Addisson-Wesley, 2003.

    Google Scholar 

  14. Halpern J. Y., and Pucella R. Modelling adversaries in a logic for security protocol analysis. In Proc. Formal Aspects of Security, vol. 2629 of Springer LNCS, pages 115–132, 2003.

    Google Scholar 

  15. Madhusudan P. Control and Synthesis of Open Reactive Systems. PhD thesis, University of Madras, November 2001.

    Google Scholar 

  16. Moses Y. Resource-bounded knowledge. In Proc. Conf. on Theoretical Aspects of Reasoning about Knowledge, pages 261–275, 1988.

    Google Scholar 

  17. van der Meyden R. and Vardi M. Y. Synthesis from knowledge-based specifications. In CONCUR’98, 9th International Conf. on Concurrency Theory, Springer LNCS No. 1466, pages 34–49, September 1998.

    Google Scholar 

  18. Manna Z., and Wolper P. Synthesis of communicating processes from temporal logic specifications, ACM Trans. Program. Lang. Syst, 6(1): 68–93, January 1984.

    Article  Google Scholar 

  19. Pnueli A., and Rosner R. On the synthesis of a reactive module. In Proc. 16th ACM Symposium on Principles of Programming Languages, Austin, January 1989.

    Google Scholar 

  20. Pnueli A., and Rosner R. Distributed reactive systems are hard to synthesize. In Proc. 31st IEEE Symposium on Foundation of Computer Science, pages 746–757, 1990.

    Google Scholar 

  21. Ramanujam R., and Suresh S. P. Deciding knowledge properties of security protocols In Proc. Conf. on Theoretical Aspects of Rationality and Knowledge, pages 219–235. ACM Digital Library, 2005.

    Google Scholar 

  22. van der Meyden R., and Wilke T. Synthesis of distributed systems from knowledgebased specifications. In Proc. Concurrency Theory, 16th Int. Conf., CONCUR 2005, pages 562–576, 2005.

    Google Scholar 

  23. Wittbold J. T., and Johnson D. M. Information flow in nondeterministic systems. In Proc. IEEE Symposium on Research in Security and Privacy, pages 144–161, 1990.

    Google Scholar 

Download references

Acknowledgements

Work supported by a grant from the Australian Research Council.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ron van der Meyden .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

van der Meyden, R. (2011). Two Applications of Epistemic Logic in Computer Security. In: van Benthem, J., Gupta, A., Parikh, R. (eds) Proof, Computation and Agency. Synthese Library, vol 352. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-0080-2_9

Download citation

Publish with us

Policies and ethics