Title :
On distributed security transaction that use secure transport protocol
Author :
Broadfoot, Philippa ; Lowe, Gavin
Author_Institution :
Comput. Lab., Oxford Univ., UK
Abstract :
In this paper, we consider techniques for designing and analyzing distributed security transactions. We present a layered approach, with a high-level security transaction layer running on top of a lower-level secure transport protocol. The secure transport protocol provides protection against dishonest outsiders, while the transaction layer can be designed to provide protection against dishonest insiders. We specify generic services that one might expect such secure transport protocols to provide. We give examples of this layered approach, with the aim of demonstrating that the separation of concerns allows for a cleaner, more intuitive design. We consider how to analyze such a layered security architecture.
Keywords :
formal specification; telecommunication security; transaction processing; transport protocols; dishonest insider; dishonest outsider; distributed transaction; generic service; secure protocol; secure transaction; security transaction layer; transport protocol; Access protocols; Authentication; Buildings; Distributed computing; Grid computing; IP networks; Laboratories; Protection; Security; Transport protocols;
Conference_Titel :
Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE
Print_ISBN :
0-7695-1927-X
DOI :
10.1109/CSFW.2003.1212710