DocumentCode :
1071569
Title :
Posets and protocols-picking the right three-party protocol
Author :
Ng, Siaw-Lynn
Author_Institution :
Inf. Security Group, Univ. of London, Egham, UK
Volume :
21
Issue :
1
fYear :
2003
fDate :
1/1/2003 12:00:00 AM
Firstpage :
55
Lastpage :
61
Abstract :
In this paper, we introduce a framework in which we can investigate the possibility of adapting a security protocol in order to obtain optimal efficiency according to the communication channels available. This method is based on the observation that there is a partial order imposed upon the actions of the various parties involved in a protocol. We define operations permitted on the partially ordered set associated with the protocol and obtain transformations of the original protocol while preserving the security properties. Performing these operations on the protocol we enumerate the options available to a system.
Keywords :
client-server systems; message authentication; protocols; telecommunication security; authentication protocols; communication channels; optimal efficiency; partial order; partially ordered set; security protocol; strand space model; three-party protocol; transformations; Authentication; Communication channels; Communication system security; Helium; Information security; Message service; Protocols;
fLanguage :
English
Journal_Title :
Selected Areas in Communications, IEEE Journal on
Publisher :
ieee
ISSN :
0733-8716
Type :
jour
DOI :
10.1109/JSAC.2002.806126
Filename :
1159655
Link To Document :
بازگشت