A logic of authentication

Michael Burrows, Martin Abadi, Roger Needham

Informasi Dasar

39 kali
24.55.042
004
e - Article Journal
1

Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. Unfortunately, their design has been extremely error prone. Most of the protocols found in the literature contain redundancies or security flaws. A simple logic has allowed us to describe the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication. We have been able to explain a variety of authentication protocols formally, to discover subtleties and errors in them, and to suggest improvements. In this paper we present the logic and then give the results of our analysis of four published protocols, chosen either because of their practical importance or because they serve to illustrate our method.

Subjek

COMPUTER SCIENCE
 

Katalog

A logic of authentication
-
19p.: pdf file.; 1 MB
English

Sirkulasi

Rp. 0
Rp. 0
Tidak

Pengarang

Michael Burrows, Martin Abadi, Roger Needham
Perorangan
 
 

Penerbit

ACM Journals
New York
1990

Koleksi

Kompetensi

 

Download / Flippingbook

 

Ulasan

Belum ada ulasan yang diberikan
anda harus sign-in untuk memberikan ulasan ke katalog ini