Title :
An introduction to the mathematics of trust in security protocols
Author :
Simmons, Gustavus J.
Abstract :
One of the most important functions performed by security protocols is to transfer trust from where it exists to where it is needed. As a result , all protocols enforce a set of restrictions as to who may exercise them-either spelled out explicitly or left implicit in the protocol specification. In addition, there may be unanticipated-even unacceptable-groupings of participants who can also exercise the protocol as a result of trusts existing among some of them. Formal methods are developed to analyze trust as a fundamental dimension in security protocol analysis and proof
Keywords :
Assembly; Authorization; Mathematics; Mirrors; Narrowband; Protocols; Security; Timing;
Conference_Titel :
Computer Security Foundations Workshop VI, 1993. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-3950-4
DOI :
10.1109/CSFW.1993.246634