On belief evolution in authentication protocols
Authentication protocols can be viewed from the perspective of the evolution of beliefs within a protocol run. Inference rules which ensue from this perspective are presented. These rules can be used to analyze the protocols which BAN logic can analyze. Additional protocols that can be analyzed incl...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Authentication protocols can be viewed from the perspective of the evolution of beliefs within a protocol run. Inference rules which ensue from this perspective are presented. These rules can be used to analyze the protocols which BAN logic can analyze. Additional protocols that can be analyzed include (1) interdomain authentication where principals must trust all authentication servers of the domains traversed according to a specific policy, and (2) where trust in the secrecy of the encryption key and belief ordering need to be established despite the lack of jurisdiction.< > |
---|---|
DOI: | 10.1109/CSFW.1991.151576 |