Safely composing security protocols

被引:0
|
作者
Véronique Cortier
Stéphanie Delaune
机构
[1] LORIA,
[2] CNRS & INRIA project Cassis,undefined
[3] LSV,undefined
[4] CNRS & INRIA project Secsi & ENS de Cachan,undefined
来源
关键词
Composition; Security protocols; Verification;
D O I
暂无
中图分类号
学科分类号
摘要
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol in the presence of an active attacker that may block, intercept and send new messages. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols are executed, possibly sharing some common keys like public keys or long-term symmetric keys.
引用
收藏
页码:1 / 36
页数:35
相关论文
共 50 条
  • [1] Safely composing security protocols
    Cortier, Veronique
    Delaitre, Jeremie
    Delaune, Stephanie
    [J]. FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 352 - 363
  • [2] Safely composing security protocols
    Cortier, Veronique
    Delaune, Stephanie
    [J]. FORMAL METHODS IN SYSTEM DESIGN, 2009, 34 (01) : 1 - 36
  • [3] Composing security protocols: From confidentiality to privacy
    School of Informatics, University of Edinburgh, United Kingdom
    不详
    不详
    不详
    [J]. Lect. Notes Comput. Sci., (324-343):
  • [4] Composing safely -: A type system for aspects
    Kammueller, Florian
    Sudhof, Henry
    [J]. SOFTWARE COMPOSITION, 2008, 4954 : 231 - +
  • [5] Composing Protocols with Randomized Actions
    Bauer, Matthew S.
    Chadha, Rohit
    Viswanathan, Mahesh
    [J]. PRINCIPLES OF SECURITY AND TRUST (POST 2016), 2016, 9635 : 189 - 210
  • [6] Composing security properties
    Lee, S
    [J]. SECURITY PROTOCOLS, 2000, 1796 : 6 - 14
  • [7] Composing Quantum Protocols in a Classical Environment
    Fehr, Serge
    Schaffner, Christian
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 350 - 367
  • [8] Composing security policies with polymer
    Bauer, L
    Ligatti, J
    Walker, D
    [J]. ACM SIGPLAN NOTICES, 2005, 40 (06) : 305 - 314
  • [9] A METHOD OF COMPOSING COMMUNICATION PROTOCOLS WITH PRIORITY SERVICE
    HIGUCHI, M
    SEKI, H
    KASAMI, T
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 1992, E75B (10) : 1032 - 1042
  • [10] Positron: Composing Commitment-Based Protocols
    Gerard, Scott N.
    Telang, Pankaj R.
    Kalia, Anup K.
    Singh, Munindar P.
    [J]. SERVICE-ORIENTED COMPUTING, (ICSOC 2015), 2015, 9435 : 19 - 35