Resiliency Aspects of Security Protocols

被引:0
|
作者
Granado, Marcus C. [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB3 0FD, England
来源
SECURITY PROTOCOLS | 2010年 / 5964卷
关键词
ENCRYPTION; SHARE; AUTHENTICATION; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Current mainstream work on security protocols usually focuses on achieving one instance of some security property, even when composition of smaller components is used in the design. This paper, instead, advocates special attention to internal components and the environment of security protocols in order to implement extra instances of the same security property. These multiple instances would be able to maintain the security property even if one or more of them failed under the attack of an adversary, providing a degrading path for the protocol assurances instead of the usual catastrophic failure.
引用
下载
收藏
页码:37 / 57
页数:21
相关论文
共 50 条
  • [31] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [32] Automated Composition of Security Protocols
    Bela, Genge
    Ignat, Iosif
    Piroska, Haller
    2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 251 - +
  • [33] Resiliency of Smart Power Meters to Common Security Attacks
    Shuaib, Khaled
    Trabelsi, Zouheir
    Abed-Hafez, Mohammad
    Gaouda, Ahmed
    Alahmad, Mahmoud
    6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 137 - 144
  • [34] Network Security and Networking Protocols
    Sharma, Arvind Kumar
    Lamba, Chattar Singh
    RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 90 - 97
  • [35] Group Anonymity in Security Protocols
    Tiplea, Ferucio Laurentiu
    Varlan, Cosmin
    PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 407 - 416
  • [36] DYNAMIC TAGS FOR SECURITY PROTOCOLS
    Arapinis, Myrto
    Delaune, Stephanie
    Kremer, Steve
    LOGICAL METHODS IN COMPUTER SCIENCE, 2014, 10 (02)
  • [37] Operational semantics of security protocols
    Cremers, C
    Mauw, S
    SCENARIOS: MODELS, TRANSFORMATIONS AND TOOLS, 2005, 3466 : 66 - 89
  • [38] A decidable analysis of security protocols
    Rusinowitch, M
    EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 21 - 21
  • [39] Proving security protocols correct
    Paulson, Lawrence C.
    Proceedings - Symposium on Logic in Computer Science, 1999, : 370 - 381
  • [40] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63