Implementing Security Protocol Monitors

نویسندگان

چکیده

Cryptographic protocols are often specified by narrations, i.e., finite sequences of message exchanges that show the intended execution protocol. Another use narrations is to describe attacks. We propose in this paper compile, when possible, attack describing into a set tests honest participants can perform exclude these executions. These be implemented monitors protect existing implementations from rogue behaviour.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementing the Transport Layer Security Protocol for Embedded Systems

Web servers are increasingly being used in embedded devices as a communication medium. As more systems connect to the Internet, the need for security is increasing. The Transport Layer Protocol (TLS) is the successor of Secure Socket Layer (SSL) and provides security in almost all secure Internet transactions. This thesis aims to investigate if TLS can be adapted to embedded systems without sac...

متن کامل

Implementing a Formally Verifiable Security Protocol in Java Card

This paper describes a case study in refining an abstract security protocol description down to a concrete implementation on a Java Card smart card. The aim is to consider the decisions that have to be made in the development of such an implementation in a systematic way, and to investigate the possibilities of formal specification and verification in the design process and for the final implem...

متن کامل

Implementing Fast Java Monitors with Relaxed-Locks

The Java Programming Language permits synchronization operations (lock, unlock, wait, notify) on any object. Synchronization is very common in applications and is endemic in the library code upon which applications depend. It is therefore critical that a monitor implementation be both space-efficient and time-efficient. We present a locking protocol, the Relaxed-Lock, that satisfies those requ...

متن کامل

Enforcing Obligation with Security Monitors

With the ubiquitous deployment of large scale networks, more and more complex human interactions are supported by computer applications. This poses new challenges on the expressiveness of security policy design systems, often requiring the use of new security paradigms. In this paper we identify a restricted type of obligation which is useful to express new security policies. This type of oblig...

متن کامل

Enforcing Obligation with Security Monitors

With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressiveness of security policy design systems, often requiring the use of new security paradigms. In this paper we identify a restricted type of obligation which is useful to express new security policies. This type of obliga...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronic proceedings in theoretical computer science

سال: 2021

ISSN: ['2075-2180']

DOI: https://doi.org/10.4204/eptcs.342.3