Skip to main content

Protocol Codesign

  • Conference paper
  • 710 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3364))

Abstract

Security protocols are moving from the network and transport layers into application layers to adapt on one hand to new paradigms in distributed applications, and to achieve on the other hand higher level security properties such as intrusion tolerance. We argue that these new protocols ensuring, for instance, intrusion tolerance can be built with the same building blocks as traditional protocols ensuring confidentiality, authentication, nonrepudiation, fair exchange, and anonymity, but need to integrate additional application-specific requirements. This calls for a new design approach where both application and security requirements are refined simultaneously. Our approach, called protocol codesign, achieves this goal by providing a rigorous methodology for designing protocols based on the composition of basic services.

This research was partially supported by DARPA/AFRL contract F30602-00-C-0087 and NSF contract CCR-0325274.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1–70 (1999)

    Google Scholar 

  2. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)

    Google Scholar 

  3. Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security (2003) (to appear)

    Google Scholar 

  4. Kwiatkowska, M., Norman, G., Parker, D.: PRISM: Probabilistic symbolic model checker. Technical Report 760/2001, University of Dortmund; also in Proc. PAPM/PROBMIV 2001 Tools Session (September 2001)

    Google Scholar 

  5. Millen, J., Ruess, H.: Protocol-independent secrecy. In: RSP: 21th IEEE Computer Society Symposium on Research in Security and Privacy (2000)

    Google Scholar 

  6. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. In: CRC Press series on discrete mathematics and its applications. CRC Press, Boca Raton (1996) ISBN 0-8493-8523-7

    Google Scholar 

  7. Lawrence, C.P.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6, 85–128 (1998)

    Google Scholar 

  8. Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)

    Google Scholar 

  9. Rushby, J.: Combining system properties: A cautionary example and formal examination. Technical report, Computer Science Laboratory, SRI International (June 1995)

    Google Scholar 

  10. Saïdi, H.: Towards automatic synthesis of security protocols. In: Logic- Based Program Synthesis Workshop. AAAI 2002 Spring Symposium, Stanford University, California (March 2002)

    Google Scholar 

  11. Shmatikov, V.: Probabilistic analysis of anonymity. In: Proc. 15th IEEE Computer Security Foundations Workshop, pp. 119–128 (2002)

    Google Scholar 

  12. Zhou, J.: Non-repudiation. PhD thesis, University of London (December 1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saïdi, H., Stavridou, V., Duterte, B. (2005). Protocol Codesign. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2003. Lecture Notes in Computer Science, vol 3364. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11542322_14

Download citation

  • DOI: https://doi.org/10.1007/11542322_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28389-8

  • Online ISBN: 978-3-540-31836-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics