Resiliency Aspects of Security Protocols

被引:0
|
作者
Granado, Marcus C. [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB3 0FD, England
来源
SECURITY PROTOCOLS | 2010年 / 5964卷
关键词
ENCRYPTION; SHARE; AUTHENTICATION; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Current mainstream work on security protocols usually focuses on achieving one instance of some security property, even when composition of smaller components is used in the design. This paper, instead, advocates special attention to internal components and the environment of security protocols in order to implement extra instances of the same security property. These multiple instances would be able to maintain the security property even if one or more of them failed under the attack of an adversary, providing a degrading path for the protocol assurances instead of the usual catastrophic failure.
引用
下载
收藏
页码:37 / 57
页数:21
相关论文
共 50 条
  • [41] Automated design of security protocols
    Chen, H
    Clark, JA
    Jacob, JL
    CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 2181 - 2188
  • [42] Update semantics of security protocols
    Hommersom, A
    Meyer, JJ
    De Vink, E
    SYNTHESE, 2004, 142 (02) : 229 - 267
  • [43] The changing environment for security protocols
    Needham, RM
    IEEE NETWORK, 1997, 11 (03): : 12 - 15
  • [44] Comparison of wireless security protocols
    Zhou, T
    Yu, Q
    Liu, H
    CCCT 2003, VOL 5, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: II, 2003, : 94 - 99
  • [45] On evaluating the performance of security protocols
    Bodei, C
    Buchholtz, M
    Curti, M
    Degano, P
    Nielson, F
    Nielson, HR
    Priami, C
    PARALLEL COMPUTING TECHNOLOGIES, 2005, 3606 : 1 - 15
  • [46] Analyzing Internet security protocols
    Yasinsac, A
    Childs, J
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, 2001, : 149 - 159
  • [47] CryptoNET: Security Management Protocols
    Abbasi, Abdul Ghafoor
    Muftic, Sead
    ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS, 2010, : 15 - 20
  • [48] Verifying security protocols with Brutus
    Clarke, EM
    Jha, S
    Marrero, W
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) : 443 - 487
  • [49] Uncovering attacks on security protocols
    Yang, W
    Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 572 - 575
  • [50] Update Semantics of Security Protocols
    Arjen Hommersom
    John-jules Meyer
    Erik De vink
    Synthese, 2004, 142 : 229 - 267