ACM Transactions on Computer Systems (TOCS)
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency
IEEE Transactions on Software Engineering
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
Introduction to grid computing with globus
Introduction to grid computing with globus
Hi-index | 0.00 |
This paper employs SVO logic to describe the interoperability protocols of GSI. As a successor of BAN logic, SVO logic can be used to assume certain goals a protocol must hold. Because the messages exchanged in a protocol depend on the credential format and encryption mechanism, these protocols are formalized in terms of protocol goals using the credential of X.509 certificates.