Gaining flexibility by security protocol transfer

被引:0
|
作者
Myrvang, Per Harald
Stabell-Kulo, Tage
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Even though PDAS in general - but smartcards in particular - are preferred over general-purpose computers to keep secrets, because they have meager resources, including them in security protocols is difficult. The PDAS- and again smartcards in particular - end up as a mere key-store and their processing power is not used. We describe a mechanism that allows such anemic computers to fully participate in protocols, even if the protocol in question by far exceeds their capabilities. This is done by means of machinery for transferring, at runtime, the protocol proper to a more powerful machine. We describe the mechanisms that make this possible (mainly a domain specific programming language named Obol [5] and its implementation) and we discuss the credentials and certificates needed for the solution to maintain correctness.
引用
收藏
页码:1041 / 1046
页数:6
相关论文
共 50 条
  • [1] Gaining flexibility
    不详
    AIRCRAFT ENGINEERING AND AEROSPACE TECHNOLOGY, 1996, 68 (03): : 44 - 45
  • [2] Online mobile payment model and protocol with flexibility and security
    Wang, Hongxin
    Yang, Deli
    Wang, Jianjun
    Ma, Hui
    ICIC Express Letters, Part B: Applications, 2012, 3 (05): : 1139 - 1146
  • [3] Losing weight, gaining flexibility
    Schut, JH
    PLASTICS WORLD, 1996, 54 (01): : 44 - &
  • [4] Security Analysis of an Ownership Transfer Protocol
    Ghadim, Gelare Oudi
    Moazami, Farokhlagha
    Oskuiee, Shabnam Saderi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (06): : 1 - 11
  • [6] Gaining Trust by Tracing Security Protocols
    Fredlund, Lars-Ake
    Benac Earle, Clara
    Arts, Thomas
    Svensson, Hans
    ERLANG '19: PROCEEDINGS OF THE 18TH ACM SIGPLAN INTERNATIONAL WORKSHOP ON ERLANG, 2019, : 56 - 67
  • [7] Gaining trust by tracing security protocols
    Fredlund, Lars-Ake
    Earle, Clara Benac
    Arts, Thomas
    Svensson, Hans
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2023, 130
  • [8] Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud On Security of AN RFID Ownership Transfer Protocol Based on Cloud
    Lee, Cheng-Chi
    Chen, Shun-Der
    Li, Chun-Ta
    Cheng, Chung-Lun
    Lai, Yan-Ming
    2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018), 2018, : 134 - 139
  • [9] Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol
    Bernardo, Danilo Valeros
    Hoang, Doan
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 100 - 114
  • [10] IMPLEMENTATION OF SECURITY FUNCTIONS INTO FILE TRANSFER, ACCESS AND MANAGEMENT PROTOCOL
    CHANG, H
    MONKEWICH, O
    MCCRUM, WA
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 547 - 553