yet, the meaning is changed after an honest agent has
signed the form. While this particular attack might
not be a problem, it does suggest that some form de-
signs might be vulnerable to such attacks. Unfortu-
nately, this kind of attack is very hard to find by hand;
it would be much better if it could be found automat-
ically through a translation to GoLog.
4 DISCUSSION
4.1 Future Work
There are two natural directions for future work. First,
as mentioned in the previous section, it would be valu-
able to turn our theory into an executable program
for finding attacks. The Golog implementation from
(Hunter et al., 2013) can immediately be applied to
find attacks due to form interception or mirroring. In
order to develop a more complete approach to form
validation, we would also like to have the intruder
use form modification actions. The challenge is to
avoid any infinite loops in which a sub-form is cre-
ated, then extended, then contracted forever. But this
is a standard problem already addressed in the Sit-
Calc tool for protocol verification, so it would be easy
enough to use the same methods for the form vali-
dation tool. The second obvious direction for future
research would be to allow more complex forms with
more structure and a wider range of options.
In the long run, it would be ideal to embed
our form validation tool in something like the Lotus
Forms designer tool. At present, Lotus Forms allows
a designer to create a form, but it does not look for any
particular attacks. It would be a significant improve-
ment if the designer would look for possible attacks
on a form, based on the number of signature fields
and the network over which it must be shared.
4.2 Conclusion
We have presented a SitCalc formalization of form
signing procedures. We have demonstrated that form
signing procedures can be formalized by extending
existing SitCalc tools for representing and reasoning
about cryptographic protocols. We have noted that
this is a problem of important practical significance,
which has not been extensively explored using for-
mal methods. It has however been demonstrated else-
where that key concepts such as commitment and de-
ception can be formalized in a logical framework in
which forms are represented as trees, and agents have
explicit beliefs. By using epistemic extensions of the
SitCalc, the framework presented here could there-
fore be used to formalize and reason about these more
complex notions as well. Logical methods have a
great deal to offer in the context of this problem; this
paper is just scratching the surface in terms of techni-
cal content and practical applications.
REFERENCES
Bertrand, R., Hearn, J., and Lett, B. (1995). The north amer-
ican pre- and post-processing equipment market: Cap-
turing the benefits and avoiding the pitfalls. Technical
report, Strategic Analysis Report, Gartner Group.
Boyer, J. (2005). Enterprise-level web form applications
with xfdl and xforms. In Proceedings of XML 2005
Conference and Exposition.
Burrows, M., Abadi, M., and Needham, R. (1990). A logic
of authentication. ACM Transactions on Computer
Systems, 8(1):18–36.
Carlucci Aiello, L. and Massacci, F. (2001). Verifying secu-
rity protocols as planning in logic programming. ACM
Transactions on Computational Logic, 2(4):542–580.
Dolev, D. and Yao, A. (1983). On the security of public key
protocols. IEEE Transactions on Information Theory,
2(29):198–208.
Fagin, R., Halpern, J., Moses, Y., and Vardi, M. (1995).
Reasoning About Knowledge. MIT Press.
Halpern, J. and Pucella, R. (2003). On the relation-
ship between strand spaces and multi-agent systems.
ACM Transactions on Information and System Secu-
rity (TISSEC), 6(1).
Hern
´
andez-Orallo, J. and Pinto, J. (2000). Especificaci
´
on
formal de protocolos criptogr
´
aficos en c
´
alculo de
situaciones. Novatica, 143:57–63.
Hunter, A. (2012). Structured documents: Signatures and
deception. In Proceedings of the European Intel-
ligence and Security Informatics Conference (EISIC
2012), pages 274–277.
Hunter, A., Delgrande, J., and McBride, R. (2013). Protocol
verification in a theory of action. In Proceedings of the
Canadian Conference on AI, pages 52–63.
Levesque, H., Pirri, F., and Reiter, R. (1998). Foundations
for the situation calculus. Link
¨
oping Electronic Arti-
cles in Computer and Inf. Science, 3(18):1–18.
van der Hoek, W. and Wooldridge, M. (2002). Tractable
multiagent planning for epistemic goals. In Proceed-
ings of AAMAS-02,.
ADeclarativeModelforReasoningaboutFormSecurity
425