A hierarchy of authentication specifications

被引:306
作者
Lowe, G
机构
来源
10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS | 1997年
关键词
D O I
10.1109/CSFW.1997.596782
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many security protocols have the aim of authenticating one agent to another. Yet there is no clear consensus in the academic literature about precisely what ''authentication'' means. In this paper we suggest that the appropriate authentication requirement will depend upon the use to which the protocol is pur, and identify several possible definitions of ''authentication''. We formalize each definition using the process algebra CSP, use this formalism to study their relative strengths, and show how the model checker FDR can be used to test whether a system running the protocol meets such a specification.
引用
收藏
页码:31 / 43
页数:13
相关论文
empty
未找到相关数据