Information Assurance for Security Protocols. Giampaolo, B. & Bistarelli, S. COMPUTERS & SECURITY, 24:322–333, 2005.
doi  abstract   bibtex   
Security protocols are used pervasively to protect distributed communications in the third Millennium. This motivates the need for a definition of Information Assurance for security protocols, which, to the best of our knowledge, is still missing. Such a definition is advanced in terms of the requirements that security protocols be analysed at the same time realistically, accurately and formally, notions that the existing literature only favours in separate contexts. The precise meanings of these terms are described by means of general considerations and concrete examples. The main goal of this paper is to draw attention to and raise concern on this novel but significant niche of computer security.
@article{
	11391_120853,
	author = {Giampaolo, Bella and Bistarelli, Stefano},
	title = {Information Assurance for Security Protocols},
	year = {2005},
	journal = {COMPUTERS & SECURITY},
	volume = {24},
	abstract = {Security protocols are used pervasively to protect distributed communications in the third Millennium. This motivates the need for a definition of Information Assurance for security protocols, which, to the best of our knowledge, is still missing. Such a definition is advanced in terms of the requirements that security protocols be analysed at the same time realistically, accurately and formally, notions that the existing literature only favours in separate contexts. The precise meanings of these terms are described by means of general considerations and concrete examples. The main goal of this paper is to draw attention to and raise concern on this novel but significant niche of computer security.},
	keywords = {Formal analysis,Constraint solving, Soft constraints, Cryptographic protocol, Realism, Accuracy, Formalism, Retaliation},
	doi = {10.1016/j.cose.2004.10.004},	
	pages = {322--333}
}

Downloads: 0