http://www.cnr.it/ontology/cnr/individuo/prodotto/ID29991
Security Protocol Deployment Risk (Articolo in rivista)
- Type
- Label
- Security Protocol Deployment Risk (Articolo in rivista) (literal)
- Anno
- 2008-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1007/978-3-642-22137-8_3 (literal)
- Alternative label
[1] Bistarelli S., [2] Foley S.N., [3] Bella G. (2008)
Security Protocol Deployment Risk
in Lecture notes in computer science; Springer, Berlin (Germania)
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- [1] Bistarelli S., [2] Foley S.N., [3] Bella G. (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
- Rivista
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- [1] CNR-IIT, Pisa, Italy; [2] Department of Computer Science, University College Cork; [3] Dip. di Matematica e Informatica Università di Catania, Italy (literal)
- Titolo
- Security Protocol Deployment Risk (literal)
- Abstract
- Security protocol participants are software and/or hardware agents that are?as with any system?potentially vulnerable to failure. Protocol analysis should extend not just to an analysis of the protocol specification, but also to its implementation and configuration in its target environment. However, an in-depth formal analysis that considers the behavior and interaction of all com- ponents in their environment is not feasible in practice. This paper considers the analysis of protocol deployment rather than imple- mentation. Instead of concentrating on detailed semantics and formal verification of the protocol and implementation, we are concerned more with with the abil- ity to trace, at a practical level of abstraction, how the protocol deployment, that is, the configuration of the protocol components, relate to each other and the overall protocol goals. We believe that a complete security verification of a system is not currently achievable in practice and seek some degree of useful feedback from an analysis that a particular protocol deployment is reasonable.
This paper considers the analysis of protocol deployment rather than imple-
mentation. Instead of concentrating on detailed semantics and formal verification
of the protocol and implementation, we are concerned more with with the abil-
ity to trace, at a practical level of abstraction, how the protocol deployment,
that is, the configuration of the protocol components, relate to each other and
the overall protocol goals. We believe that a complete security verification of a
system is not currently achievable in practice and seek some degree of useful
feedback from an analysis that a particular protocol deployment is reasonable. (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Editore di
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
- Insieme di parole chiave di