Skip to main content

SVO Logic Based Formalisms of GSI Protocols

  • Conference paper
Parallel and Distributed Computing: Applications and Technologies (PDCAT 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3320))

  • 1055 Accesses

Abstract

This paper employs SVO logic to describe the interoperability protocols of GSI. As a successor of BAN logic, SVO logic can be used to assume certain goals a protocol must hold. Because the messages exchanged in a protocol depend on the credential format and encryption mechanism, these protocols are formalized in terms of protocol goals using the credential of X.509 certificates.

This research is supported by the National Grand Fundamental Research 973 Program of China (No.2002CB312002), China Grid Project, China Postdoctoral Science Foundation, and Grand Project of the Science and Technology Commission of Shanghai Municipality (No.03dz15027).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ferreira, L., Berstis, V., Armstrong, J., Kendzierski, M., Neukoetter, A., Takagi, M., Bing-Wo, R., Amir, A., Murakawa, R., Hernandez, O., Magowan, J., Bieberstein, N.: Introduction to Grid Computing with Globus. IBM Corp. (2002)

    Google Scholar 

  2. Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Li, G., Reiter, M. (eds.) Proc. of the 5th ACM Conf. on Computer and Comm. Sec., pp. 83–92. ACM Press, New York (1998)

    Google Scholar 

  3. Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Trans. on Computer Syst. 1, 18–36 (1990)

    Article  Google Scholar 

  4. Syverson, P., Cervesato, I.: The Logic of Authentication Protocols. In: Batini, C., Giunchiglia, F., Giorgini, P., Mecella, M. (eds.) CoopIS 2001. LNCS, vol. 2172. Springer, Heidelberg (2001)

    Google Scholar 

  5. Dekke, A.: C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis. In: Proc. of 13th IEEE Computer Sec. Foundations Workshop, pp. 77–87. IEEE Press, Cambridge (2000)

    Chapter  Google Scholar 

  6. Stubblebine, G., Wright, N.: An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. IEEE Trans. on Software Eng. 3, 256–285 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, H., Li, M. (2004). SVO Logic Based Formalisms of GSI Protocols. In: Liew, KM., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds) Parallel and Distributed Computing: Applications and Technologies. PDCAT 2004. Lecture Notes in Computer Science, vol 3320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30501-9_145

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30501-9_145

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24013-6

  • Online ISBN: 978-3-540-30501-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics