Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1368310.1368330acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Verified implementations of the information card federated identity-management protocol

Published: 18 March 2008 Publication History

Abstract

We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card Profile V1.0. Our code can interoperate with existing implementations of the roles of the protocol (client, identity provider, and relying party). We derive formal proofs of security properties for our code using an automated theorem prover. Hence, we obtain the most substantial examples of verified implementations of cryptographic protocols to date, and the first for any federated identity-management protocols. Moreover, we present a tool that downloads security policies from services and identity providers and compiles them to a verifiably secure client proxy.

References

[1]
M. Abadi and C. Fournet. Mobile values, new names, and secure communication. In 28th ACM Symposium on Principles of Programming Languages (POPL'01), pages 104--115, 2001.
[2]
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1--70, 1999.
[3]
M. Backes, S. Mödersheim, B. Pfitzmann, and L. Viganò. Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In Foundations of Software Science and Computation Structures (FOSSACS), LNCS. Springer, 2006.
[4]
K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. Theoretical Computer Science, 340(1):102--153.
[5]
K. Bhargavan, C. Fournet, and A. D. Gordon. Verifying policy-based security for web services. In 11th ACM Conference on Computer and Communications Security (CCS'04), pages 268--277, October 2004.
[6]
K. Bhargavan, C. Fournet, and A. D. Gordon. Verified reference implementations of WS-Security protocols. In WS-FM '06, volume 4184 of LNCS. Springer, 2006a.
[7]
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In 19th IEEE Computer Security Foundations Workshop (CSFW'06), pages 139--152, 2006b.
[8]
B. Blanchet. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium (SAS'02), volume 2477 of Lecture Notes in Computer Science, pages 342--359. Springer-Verlag, 2002.
[9]
B. Blanchet, M. Abadi, and C. Fournet. Automated verification of selected equivalences for security protocols. In 20th IEEE Symposium on Logic in Computer Science (LICS'05), pages 331--340, 2005.
[10]
K. Cameron. The laws of identity. At http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf, 2005.
[11]
Scott Cantor, John Kemp, Rob Philpott, and Eve Maler. Assertions and protocols for the oasis security assertion markup language (saml) v2.0, 2005.
[12]
E. Christensen, F. Curbera, G. Meredith, and S. Weerawarana. Web services description language (WSDL) 1.2, 2002. At http://www.w3.org/TR/2002/WD-wsdl12-20020709.
[13]
R. Corin, P-M. Dénielou, C. Fournet, K. Bhargavan, and J. J. Leifer. Secure implementations of typed session abstractions. In 20th IEEE Computer Security Foundations Symposium (CSF20), pages 170--186, 2007.
[14]
T. Dierks and E. Rescorla. The transport layer security (tls) protocol, version 1.1, April 2006. URL http://www.ietf.org/rfc/rfc4346. txt.
[15]
D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT--29(2):198--208, 1983.
[16]
D. Eastlake, J. Reagle, D. Solo, et al. XML-Signature Syntax and Processing, 2002a. URL http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/. W3C Recommendation.
[17]
D. Eastlake, J. Reagle, et al. XML Encryption Syntax and Processing, 2002b. URL http://www.w3.org/TR/2002/REC-xmlenc-core-20021210/. W3C Recommendation.
[18]
A. Armando et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In 17th Conference on Computer Aided Verification (CAV), LNCS, pages 281--285. Springer, 2005.
[19]
P. Giambiagi and M. Dam. On the secure implementation of security protocols. Science of Computer Programming, 50:73--99, 2004.
[20]
J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In VMCAI'05, volume 3385 of LNCS, pages 363--379. Springer, 2005.
[21]
M. Gudgin et al. SOAP Version 1.2, 2003. URL http://www.w3.org/TR/soap12. W3C Recommendation.
[22]
S. M. Hansen, J. Skriver, and H. Riis Nielson. Using static analysis to validate the SAML single sign-on protocol. In Workshop on Issues in the Theory of Security (WITS'06), pages 27--40, 2006.
[23]
M. Jones. A Guide to Supporting Information Cards within Web Applications and Browsers as of the Information Card Profile V1.0. Microsoft Corporation, December 2006. At http://go.microsoft.com/fwlink/?LinkId=88956.
[24]
C. Kaler, A. Nadalin, et al. Web services security policy language (WS-SecurityPolicy), version 1.1, July 2005.
[25]
E. Kleiner and A. W. Roscoe. Web services security: A preliminary study using Casper and FDR. In Automated Reasoning for Security Protocol Analysis (ARSPA 04), 2004.
[26]
E. Kleiner and A. W. Roscoe. On the relationship between web services security and traditional protocols. In Mathematical Foundations of Programming Semantics (MFPS XXI), 2005.
[27]
InfoCard Guide. A Guide to Interoperating with the Information Card Profile V1.0. Microsoft Corporation and Ping Identity Corporation, December 2006. At http://go.microsoft.com/fwlink/?LinkId=87446.
[28]
F. Muller and J. Millen. Cryptographic protocol generation from CAPSL. Technical Report SRI-CSL-01-07, SRI, 2001.
[29]
A. Nadalin, C. Kaler, P. Hallam-Baker, and R. Monzillo. OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004), March 2004. OASIS Standard 200401.
[30]
A. Nanda. A Technical Reference for the Information Card Profile V1.0. Microsoft Corporation, December 2006. At http://go.microsoft.com/fwlink/?LinkId=87444.
[31]
OSIS: The Open-Source Identity System. OSIS, 2006. At http://osis.netmesh.org/wiki/.
[32]
A. Perrig, D. Song, and D. Phan. AGVI -- automatic generation, verification, and implementation of security protocols. In 13th Conference on Computer Aided Verification (CAV), LNCS, pages 241--245. Springer, 2001.
[33]
B. Pfitzmann and M. Waidner. Federated identity-management protocols. In 11th International Workshop on Security Protocols (2003), volume 3364 of LNCS, pages 153--174. Springer, 2005.
[34]
E. Poll and A. Schubert. Verifying an implementation of SSH. In Workshop on Issues in the Theory of Security (WITS'07), 2007.
[35]
D. Syme. F#, 2005. Project website at http://research.microsoft.com/fsharp/.
[36]
T. Y. C. Woo and S. S. Lam. A semantic model for authentication protocols. In IEEE Computer Society Symposium on Research in Security and Privacy, pages 178--194, 1993.

Cited By

View all
  • (2021)DCSS Protocol for Data Caching and Sharing Security in a 5G NetworkNetwork10.3390/network10200061:2(75-94)Online publication date: 7-Jul-2021
  • (2020)Network Service Federated Identity (NS- FId) Protocol for Service Authorization in 5G Network2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)10.1109/FMEC49853.2020.9144706(128-135)Online publication date: Apr-2020
  • (2019)Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediariesProceedings of the 12th International Conference on Security of Information and Networks10.1145/3357613.3357641(1-5)Online publication date: 12-Sep-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security
March 2008
399 pages
ISBN:9781595939791
DOI:10.1145/1368310
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 March 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CardSpace
  2. cryptographic protocol verification
  3. federated identity management
  4. verified implementations
  5. web services security

Qualifiers

  • Research-article

Conference

Asia CCS '08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)DCSS Protocol for Data Caching and Sharing Security in a 5G NetworkNetwork10.3390/network10200061:2(75-94)Online publication date: 7-Jul-2021
  • (2020)Network Service Federated Identity (NS- FId) Protocol for Service Authorization in 5G Network2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)10.1109/FMEC49853.2020.9144706(128-135)Online publication date: Apr-2020
  • (2019)Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediariesProceedings of the 12th International Conference on Security of Information and Networks10.1145/3357613.3357641(1-5)Online publication date: 12-Sep-2019
  • (2019)Automated Verification of Cryptographic Protocol Implementations2019 12th International Conference on Developments in eSystems Engineering (DeSE)10.1109/DeSE.2019.00157(849-854)Online publication date: Oct-2019
  • (2018)Automated Proofs of Signatures using Bilinear Pairings2018 16th Annual Conference on Privacy, Security and Trust (PST)10.1109/PST.2018.8514201(1-10)Online publication date: Aug-2018
  • (2014)Discovering concrete attacks on website authorization by formal analysisJournal of Computer Security10.5555/2699784.269978922:4(601-657)Online publication date: 1-Jul-2014
  • (2014)A Cross-IdP Single Sign-On Method in SAML-Based ArchitectureFuture Information Technology10.1007/978-3-642-40861-8_10(63-68)Online publication date: 2014
  • (2013)Provably repairing the ISO/IEC 9798 standard for entity authenticationJournal of Computer Security10.5555/2595044.259504721:6(817-846)Online publication date: 1-Nov-2013
  • (2013)Towards a Verified Reference Implementation of a Trusted Platform ModuleSecurity Protocols XVII10.1007/978-3-642-36213-2_11(69-81)Online publication date: 2013
  • (2012)Towards a Trust Management Enabled Identity MetasystemIntelligent and Knowledge-Based Computing for Business and Organizational Advancements10.4018/978-1-4666-1577-9.ch007(118-134)Online publication date: 2012
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media