Synthesising End-to-End Security Protocols

被引:0
|
作者
Thevathayan, Charles [1 ]
Bertok, Peter [1 ]
Fernandez, George [1 ]
机构
[1] RMIT, Melbourne, Vic, Australia
来源
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM) | 2014年
关键词
Security Protocols; End-to-End Security;
D O I
10.1109/TrustCom.2014.132
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
E-commerce transactions rely on end-to-end protocols to provide security guarantees when messages are sent through intermediaries. If autonomous entities with different security requirements are to collaborate, protocols providing end-to-end security must be synthesized at runtime. However, such an approach is predicated on finding security primitives and ways of expressing interdependencies between semantics and security. The proposed approach defines fine-grained security properties by combining basic properties and enforcing them in a predefined order. The use of standard security properties allows autonomous entities to reason about security requirements. Furthermore, the novel propagation rules defined allow end-to-end security properties to be derived from entity security requirements. By using proven schemes designed to enforce such requirements, this approach allows end-to-end security protocols similar to the SET purchase protocol to be created at runtime.
引用
收藏
页码:440 / 447
页数:8
相关论文
共 50 条
  • [1] Tailoring End-to-End IP Security Protocols to the Internet of Things
    Hummen, Rene
    Wirtz, Hanno
    Ziegeldorf, Jan Henrik
    Hiller, Jens
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [2] Performance Evaluation of end-to-end security protocols in an Internet of Things
    De Rubertis, Antonio
    Mainetti, Luca
    Mighali, Vincenzo
    Patrono, Luigi
    Sergi, Ilaria
    Stefanizzi, Maria Laura
    Pascali, Stefano
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 94 - 99
  • [3] ANALYSIS OF END-TO-END SOA SECURITY PROTOCOLS WITH MOBILE DEVICES
    Ahmed, Norman
    Gamble, Rose
    Linderman, Mark
    Bhargava, Bharat
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 166 - 170
  • [4] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [5] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [6] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [7] Counting protocols for reliable end-to-end transmission
    Ladner, RE
    LaMarca, A
    Tempero, E
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1998, 56 (01) : 96 - 111
  • [8] Counting protocols for reliable end-to-end transmission
    Ladner, Richard E.
    LaMarca, Anthony
    Tempero, Ewan
    1998, Academic Press Inc., Orlando, FL, United States (56)
  • [9] Modeling the Value of End-to-End Multipath Protocols
    Suomi, Henna
    Kilkki, Kalevi
    Hammainen, Heikki
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (14) : 2071 - 2092
  • [10] MODELING AND VERIFICATION OF END-TO-END TRANSPORT PROTOCOLS
    DANTHINE, A
    BREMER, J
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1978, 2 (4-5): : 381 - 395