Using encryption for authentication in large networks of computers
Communications of the ACM
Reasoning about Accountability within Delegation
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Digital signatures and electronic documents: a cautionary tale
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Delegation Protocols for Electronic Commerce
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
A Logical Language for Specifying Cryptographic Protocol Requirements
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Environmental requirements for authentication protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Hi-index | 0.00 |
We present a model for increasing the effectiveness of the communication between an application and a security protocol. The model is a development of previous work by Syverson and Meadows. It also incorporates our notion that transferability and control of data across a secure interface can improve the use of security services by applications.