Protocol codesign

  • Authors:
  • Hassen Saïdi;Victoria Stavridou;Bruno Duterte

  • Affiliations:
  • System Design Laboratory, SRI International, Menlo Park, CA;System Design Laboratory, SRI International, Menlo Park, CA;System Design Laboratory, SRI International, Menlo Park, CA

  • Venue:
  • Proceedings of the 11th international conference on Security Protocols
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security protocols are moving from the network and transport layers into application layers to adapt on one hand to new paradigms in distributed applications, and to achieve on the other hand higher level security properties such as intrusion tolerance. We argue that these new protocols ensuring, for instance, intrusion tolerance can be built with the same building blocks as traditional protocols ensuring confidentiality, authentication, nonrepudiation, fair exchange, and anonymity, but need to integrate additional application-specific requirements. This calls for a new design approach where both application and security requirements are refined simultaneously. Our approach, called protocol codesign, achieves this goal by providing a rigorous methodology for designing protocols based on the composition of basic services.