Measuring protocol strength with security goals

被引:4
|
作者
Rowe, Paul D. [1 ]
Guttman, Joshua D. [1 ]
Liskov, Moses D. [1 ]
机构
[1] Mitre Corp, Burlington Rd, Bedford, MA 01730 USA
关键词
Partial Order; Atomic Formula; Trust Third Party; Cryptographic Protocol; Security Goal;
D O I
10.1007/s10207-016-0319-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Flaws in published standards for security protocols are found regularly, often after systems implementing those standards have been deployed. Because of deployment constraints and disagreements among stakeholders, different fixes may be proposed and debated. In this process, security improvements must be balanced with issues of functionality and compatibility. This paper provides a family of rigorous metrics for protocol security improvements. These metrics are sets of first-order formulas in a goal language associated with a protocol . The semantics of is compatible with many ways to analyze protocols, and some metrics in this family are supported by many protocol analysis tools. Other metrics are supported by our Cryptographic Protocol Shapes Analyzer cpsa. This family of metrics refines several "hierarchies" of security goals in the literature. Our metrics are applicable even when, to mitigate a flaw, participants must enforce policies that constrain protocol execution. We recommend that protocols submitted to standards groups characterize their goals using formulas in , and that discussions comparing alternative protocol refinements measure their security in these terms.
引用
收藏
页码:575 / 596
页数:22
相关论文
共 50 条
  • [21] Protocol for Forearm Pronosupination Strength Measuring in Different Postures: Reliability and Influence of Relevant Factors
    Ligero, Cristina Herrera
    Zuriaga, Daniel Sanchez
    Iranzo, Ursula Martinez
    Corresa, Salvador Pitarch
    De Rosario, Helios
    [J]. AMERICAN JOURNAL OF OCCUPATIONAL THERAPY, 2023, 77 (05):
  • [22] Measuring muscular strength of the lower limbs by hand-held dynamometer: A standard protocol
    S. Bandinelli
    E. Benvenuti
    I. Del Lungo
    M. Baccini
    F. Benvenuti
    A. Di Iorio
    L. Ferrucci
    [J]. Aging Clinical and Experimental Research, 1999, 11 : 287 - 293
  • [23] Motivational strength of goals and cognitive strength of goal representations
    Gerjets, P
    Heise, E
    Westermann, R
    [J]. PROCEEDINGS OF THE NINETEENTH ANNUAL CONFERENCE OF THE COGNITIVE SCIENCE SOCIETY, 1997, : 928 - 928
  • [24] ANALYSIS OF CROATIAN SECURITY POLICY GOALS
    Zguric, Borna
    Petek, Ana
    [J]. CROATIAN AND COMPARATIVE PUBLIC ADMINISTRATION, 2022, 22 (04): : 735 - 764
  • [25] Synthesis: Goals to Achieve Soil Security
    Morgan, Cristine L. S.
    McBratney, Alex B.
    Field, Damien J.
    Koch, Andrea
    Bouma, Johan
    Carre, Florence
    [J]. GLOBAL SOIL SECURITY, 2017, : 457 - 462
  • [26] Measuring job security
    Nardone, T
    Veum, J
    Yates, J
    [J]. MONTHLY LABOR REVIEW, 1997, 120 (06) : 26 - 33
  • [27] Measuring Application Security
    Horn, Christopher
    D'Amico, Anita
    [J]. ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, AHFE 2018, 2019, 782 : 44 - 55
  • [28] Measuring systems security
    Bayuk, Jennifer
    Mostashari, Ali
    [J]. SYSTEMS ENGINEERING, 2013, 16 (01) : 1 - 14
  • [29] Measuring Security Practices
    DeKoven, Louis F.
    Randall, Audrey
    Mirian, Ariana
    Akiwate, Gautam
    Blume, Ansel
    Saul, Lawrence K.
    Schulman, Aaron
    Voelker, Geoffrey M.
    Savage, Stefan
    [J]. COMMUNICATIONS OF THE ACM, 2022, 65 (09) : 93 - 102
  • [30] Goals for a configuration management network protocol
    Whitehead, EJ
    [J]. SYSTEM CONFIGURATION MANAGEMENT, 1999, 1675 : 186 - 203