An introduction to formal specification and Z
An introduction to formal specification and Z
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
On the characterisation of a trusting agent - aspects of a formal approach
Trust and deception in virtual societies
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Modelling Trust Structures for Public Key Infrastructures
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Understanding Trust Management Systems
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Hi-index | 0.00 |
Key distribution and trust management are two areas of interest in the world of internet security and are often merged to provide key distribution in the presence of trust relationships. We present two generic models using the Object-Z formalism, one for key distribution and another for trust management, and we show how the models can be combined via inheritance to produce concise models of key distribution in the presence of trust. We use Pretty Good Privacy as a specific example.