skip to main content
article
Free Access

A critique of the Burrows, Abadi and Needham logic

Published:01 April 1990Publication History
First page image

References

  1. [1] Burrows, M., Abadi, M., and Needham, R. A logic of authentication. In Proceedings of the 12th Symposium on Operating System Principles (Litchfield Park, Arizona, Dec., 1989). ACM, 1989, pp. 1-13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Nessett, D. Factors affecting distributed system security. IEEE Trans. Soft. Eng., SE-13, (Feb. 1987) 223-248. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A critique of the Burrows, Abadi and Needham logic
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGOPS Operating Systems Review
            ACM SIGOPS Operating Systems Review  Volume 24, Issue 2
            April 1990
            67 pages
            ISSN:0163-5980
            DOI:10.1145/382258
            Issue’s Table of Contents

            Copyright © 1990 Author

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 April 1990

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader