An analysis of conformance issues in implementations of standardized security protocols

被引:3
作者
Izquierdo, Antonio [1 ]
Sierra, Jose M. [1 ]
Torres, Joaquin [1 ]
机构
[1] Univ Carlos III Madrid, Madrid 28911, Spain
关键词
Standards implementations; Data communications; Security protocols; Standards validation; Performance evaluation;
D O I
10.1016/j.csi.2007.12.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the last years the amount of information being transmitted through communication networks has increased, and this has lead to an increased use of security protocols. The implementations of security protocols do not accurately follow the standards and this causes many malfunctions and security flaws. In this paper we will analyze the different approaches followed by the scientific community to evaluate security protocols implementations, and will also analyze the special characteristics of security protocols, in order to deduce which are the key points for such an evaluation, how they can be evaluated and also if existing evaluation techniques can be used. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:246 / 251
页数:6
相关论文
共 10 条
[1]  
[Anonymous], 749811994 ISOIEC
[2]  
[Anonymous], P 5 ACM COMP COMM SE, DOI DOI 10.1145/288090.288111
[3]   An open secure Mobile Agent framework for systems management [J].
Bellavista P. ;
Corradi A. ;
Stefanelli C. .
Journal of Network and Systems Management, 1999, 7 (3) :323-339
[4]  
BRADNER S, 1999, 2544 INT ENG TASK FO
[5]  
HICKMAN B, 2003, 3511 INT ENG TASK FO
[6]  
SCHNEIER B, 1998, P 5 ACM C COMP COMM, P132
[7]  
SIEBENLIST F, 2002, OGSA SECURITY ROADMA
[8]  
*VPNC, 2004, VPNC TEST INT VPN CO
[9]   M2RT:: A tool developed for predicting the mean message response time of communication channels iu sizeable networks exemplified by the Internet [J].
Wong, AKY ;
Dillon, TS ;
Lin, WWK ;
Ip, MTW .
COMPUTER NETWORKS, 2001, 36 (5-6) :557-577
[10]  
2004, LINUX FREES WAN COMP