DocumentCode :
3379230
Title :
An introduction to the mathematics of trust in security protocols
Author :
Simmons, Gustavus J.
fYear :
1993
fDate :
15-17 Jun 1993
Firstpage :
121
Lastpage :
127
Abstract :
One of the most important functions performed by security protocols is to transfer trust from where it exists to where it is needed. As a result , all protocols enforce a set of restrictions as to who may exercise them-either spelled out explicitly or left implicit in the protocol specification. In addition, there may be unanticipated-even unacceptable-groupings of participants who can also exercise the protocol as a result of trusts existing among some of them. Formal methods are developed to analyze trust as a fundamental dimension in security protocol analysis and proof
Keywords :
Assembly; Authorization; Mathematics; Mirrors; Narrowband; Protocols; Security; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop VI, 1993. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-3950-4
Type :
conf
DOI :
10.1109/CSFW.1993.246634
Filename :
246634
Link To Document :
بازگشت