Resiliency Aspects of Security Protocols

被引:0
|
作者
Granado, Marcus C. [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB3 0FD, England
来源
SECURITY PROTOCOLS | 2010年 / 5964卷
关键词
ENCRYPTION; SHARE; AUTHENTICATION; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Current mainstream work on security protocols usually focuses on achieving one instance of some security property, even when composition of smaller components is used in the design. This paper, instead, advocates special attention to internal components and the environment of security protocols in order to implement extra instances of the same security property. These multiple instances would be able to maintain the security property even if one or more of them failed under the attack of an adversary, providing a degrading path for the protocol assurances instead of the usual catastrophic failure.
引用
收藏
页码:37 / 57
页数:21
相关论文
共 50 条
  • [1] Resource and timing aspects of security protocols
    Urquiza, Abraao Aires
    Alturki, Musab A.
    Kirigin, Tajana Ban
    Kanovich, Max
    Nigam, Vivek
    Scedrov, Andre
    Talcott, Carolyn
    [J]. JOURNAL OF COMPUTER SECURITY, 2021, 29 (03) : 299 - 340
  • [2] On Some Time Aspects in Security Protocols Analysis
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    [J]. COMPUTER NETWORKS, CN 2018, 2018, 860 : 344 - 356
  • [3] Resiliency, security, automation
    Hale, Gregory
    [J]. Control Engineering, 2020, 67 (12)
  • [4] Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT
    Avila, Karen
    Jabba, Daladier
    Gomez, Javier
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (18):
  • [5] Modeling advanced security aspects of key exchange and secure channel protocols
    Gunther, Felix
    [J]. IT-INFORMATION TECHNOLOGY, 2020, 62 (5-6): : 287 - 293
  • [6] Simulation aspects of security with regard to applications using public network protocols
    Iwu, FO
    Zobel, RN
    [J]. MODELLING AND SIMULATION 2001, 2001, : 524 - 528
  • [7] SAT and SMT-Based Verification of Security Protocols Including Time Aspects
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Zbrzezny, Agnieszka M.
    Zbrzezny, Andrzej
    Kurkowski, Miroslaw
    [J]. SENSORS, 2021, 21 (09)
  • [8] Security and Resiliency of Coordinated Autonomous Vehicles
    Benko, Jennavive
    Clark, William
    Craig, Candace
    Culver, Grace
    Mahan, Patrick
    Patel, Ajay
    Voce, Daniel
    Bezzo, Nicola
    Lewin, Gregory C.
    [J]. 2019 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (SIEDS), 2019, : 311 - 316
  • [9] Trading resiliency for security: Model and algorithms
    Bu, T
    Norden, S
    Woo, T
    [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS, 2004, : 218 - 227
  • [10] Resiliency Taxonomy of Routing Protocols in Wireless Sensor Networks
    Erdene-Ochir, Ochirkhand
    Minier, Marine
    Valois, Fabrice
    Kountouris, Apostolos
    [J]. 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 324 - 327