Gaining flexibility by security protocol transfer

被引:0
|
作者
Myrvang, Per Harald
Stabell-Kulo, Tage
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Even though PDAS in general - but smartcards in particular - are preferred over general-purpose computers to keep secrets, because they have meager resources, including them in security protocols is difficult. The PDAS- and again smartcards in particular - end up as a mere key-store and their processing power is not used. We describe a mechanism that allows such anemic computers to fully participate in protocols, even if the protocol in question by far exceeds their capabilities. This is done by means of machinery for transferring, at runtime, the protocol proper to a more powerful machine. We describe the mechanisms that make this possible (mainly a domain specific programming language named Obol [5] and its implementation) and we discuss the credentials and certificates needed for the solution to maintain correctness.
引用
收藏
页码:1041 / 1046
页数:6
相关论文
共 50 条
  • [31] SDR Technology Targets Flexibility and Security
    Browne, Jack
    MICROWAVES & RF, 2013, 52 (06) : 54 - +
  • [32] Security and Flexibility in Water Supply.
    van Duuren, F.A.
    Van Craenenbroeck, W.
    Brumagne, D.
    Friis, P.
    Haume, E.
    Kauppila, A.
    Schulhof, P.
    Thikoetter, H.
    Thomas, G.A.
    Varszegi, C.
    Misiti, A.
    Kawaguchi, S.
    van Rijsbergen, D.
    Water Supply, 1986, 5 (3 /4):
  • [33] The Political Economy of Work Security and Flexibility
    Meardi, Guglielmo
    BRITISH JOURNAL OF INDUSTRIAL RELATIONS, 2013, 51 (02) : 417 - 419
  • [34] Security consolidation and optimisation: Gaining the most from your IT assets
    Dimension Data
    Comput. Fraud Secur., 2009, 5 (15-17):
  • [35] Continuous humanoid interaction: An integrated perspective - gaining adaptivity, redundancy, flexibility - in one
    Cheng, GD
    Nagakubo, A
    Kuniyoshi, Y
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2001, 37 (2-3) : 161 - 183
  • [36] Gaining flexibility and performance of computing using tailored instruction set and reconfigurable architecture
    Tian Hangpei
    Gao Deyuan
    Zhu Yian
    Wang Deli
    Wang Jing
    MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 324 - 329
  • [37] Gaining Location Privacy from Service Flexibility: A Bayesian Game Theoretic Approach
    Hong, Shu
    Duan, Lingjie
    Huang, Jianwei
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [38] GAINING FLEXIBILITY IN EXPERTISE THROUGH EXECUTIVE EDUCATION: TUNING SCHEMAS IN DESIGN THINKING
    Meisiek, Stefan
    Beausoleil, Angele M.
    Barry, Daved
    Dattani, Anjana
    ACADEMY OF MANAGEMENT LEARNING & EDUCATION, 2023, 22 (04) : 574 - 594
  • [39] The OSD security protocol
    Factor, Michael
    Nagle, David
    Naor, Dalit
    Riedel, Erik
    Satran, Julian
    THIRD INTERNATIONAL IEEE SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2006, : 29 - +
  • [40] ON SECURITY OF THE SESPAKE PROTOCOL
    Alekseev, E. K.
    Smyshlyaev, S., V
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (50): : 5 - 41