DocumentCode
2139651
Title
On belief evolution in authentication protocols
Author
Kailar, Rajashekar ; Gligor, Virgil D.
Author_Institution
Dept. of Electr. Eng., Maryland Univ., College Park, MD, USA
fYear
1991
fDate
18-20 Jun 1991
Firstpage
103
Lastpage
116
Abstract
Authentication protocols can be viewed from the perspective of the evolution of beliefs within a protocol run. Inference rules which ensue from this perspective are presented. These rules can be used to analyze the protocols which BAN logic can analyze. Additional protocols that can be analyzed include (1) interdomain authentication where principals must trust all authentication servers of the domains traversed according to a specific policy, and (2) where trust in the secrecy of the encryption key and belief ordering need to be established despite the lack of jurisdiction
Keywords
cryptography; protocols; BAN logic; authentication protocols; belief evolution; belief ordering; encryption key; inference rules; secrecy; Authentication; Body sensor networks; Cryptography; Educational institutions; Formal specifications; Logic design; Privacy; Protocols; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Foundations Workshop IV, 1991. Proceedings
Conference_Location
Franconia, NH
Print_ISBN
0-8186-2215-6
Type
conf
DOI
10.1109/CSFW.1991.151576
Filename
151576
Link To Document