Security protocols verification in abductive logic programming: a case study