Gaining flexibility by security protocol transfer

被引:0
|
作者
Myrvang, Per Harald
Stabell-Kulo, Tage
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Even though PDAS in general - but smartcards in particular - are preferred over general-purpose computers to keep secrets, because they have meager resources, including them in security protocols is difficult. The PDAS- and again smartcards in particular - end up as a mere key-store and their processing power is not used. We describe a mechanism that allows such anemic computers to fully participate in protocols, even if the protocol in question by far exceeds their capabilities. This is done by means of machinery for transferring, at runtime, the protocol proper to a more powerful machine. We describe the mechanisms that make this possible (mainly a domain specific programming language named Obol [5] and its implementation) and we discuss the credentials and certificates needed for the solution to maintain correctness.
引用
收藏
页码:1041 / 1046
页数:6
相关论文
共 50 条
  • [21] ESSR Security Committee Chairman gaining friends and people
    Pillak, Peep
    TUNA-AJALOOKULTUURI AJAKIRI, 2016, (04): : 149 - 153
  • [22] Gaining security by trashing the state? A reply to Bellamy & McDonald
    Thomas, N
    Tow, WT
    SECURITY DIALOGUE, 2002, 33 (03) : 379 - 382
  • [23] Hidden Storage in Data Centers: Gaining Flexibility Through Cooling Systems
    Basmadjian, Robert
    Ghiassi-Farrokhfal, Yashar
    Vishwanath, Arun
    MEASUREMENT, MODELLING AND EVALUATION OF COMPUTING SYSTEMS, MMB 2018, 2018, 10740 : 68 - 82
  • [24] Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer
    Kiraz, Mehmet Sabir
    Genc, Ziya Alper
    Kardas, Suleyman
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4123 - 4135
  • [25] Security and Improvement of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (05): : 1943 - 1949
  • [26] FLEXIBILITY OF TRANSFER LINES
    HAAS, M
    WERKSTATTSTECHNIK ZEITSCHRIFT FUR INDUSTRIELLE FERTIGUNG, 1984, 74 (03): : 163 - 166
  • [27] The role of the judiciary in balancing flexibility and security
    van Staden, Marius
    DE JURE, 2013, 46 (02) : 470 - 485
  • [28] Improving security and flexibility of user authentication
    Hajny, Jan
    Pelka, Tomas
    Zeman, Vaclav
    APPLIED AND COMPUTATIONAL MATHEMATICS, 2ND EDITION, 2008, : 258 - +
  • [29] Designing for flexibility in aviation security systems
    Jacobson, Sheldon H.
    Lee, Adrian J.
    Nikolaev, Alexander G.
    JOURNAL OF TRANSPORTATION SECURITY, 2009, 2 (1-2) : 1 - 8
  • [30] Container Technology: Flexibility and Security for the IIoT
    Noack, Axel
    ATP MAGAZINE, 2020, (04): : 56 - 57