Client v. server side protocols, interfaces and storage

被引:0
作者
Price, G [1 ]
机构
[1] Royal Holloway Univ London, Dept Math, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
SECURITY PROTOCOLS | 2005年 / 3364卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a model for increasing the effectiveness of the communication between an application and a security protocol. The model is a development of previous work by Syverson and Meadows. It also incorporates our notion that transferability and control of data across a secure interface can improve the use of security services by applications.
引用
收藏
页码:63 / 79
页数:17
相关论文
共 17 条
[1]  
ABADI M, 1994, 125 DIG EQ CORP SYST
[2]  
[Anonymous], 1999, 2560 IETF RFC
[3]   A LOGIC OF AUTHENTICATION [J].
BURROWS, M ;
ABADI, M ;
NEEDHAM, RM .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871) :233-271
[4]  
CANETTI R, 2002, LECT NOTES COMPUTER, V2609, P338
[5]  
CRIPSO B, 2001, P 6 IEEE S COMP COMM
[6]  
CRISPO B, 2001, P ICICS 2001 3 INT C
[7]  
GONG L, 1994, SRICSL9414 INT COMP
[8]  
KAIN K, 2002, 6 IFIP C COMM MULT S
[9]  
Lowe G, 1996, SOFTWARE-CONC TOOL, V17, P93
[10]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999