Abstract
Security protocols are moving from the network and transport layers into application layers to adapt on one hand to new paradigms in distributed applications, and to achieve on the other hand higher level security properties such as intrusion tolerance. We argue that these new protocols ensuring, for instance, intrusion tolerance can be built with the same building blocks as traditional protocols ensuring confidentiality, authentication, nonrepudiation, fair exchange, and anonymity, but need to integrate additional application-specific requirements. This calls for a new design approach where both application and security requirements are refined simultaneously. Our approach, called protocol codesign, achieves this goal by providing a rigorous methodology for designing protocols based on the composition of basic services.
This research was partially supported by DARPA/AFRL contract F30602-00-C-0087 and NSF contract CCR-0325274.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1–70 (1999)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security (2003) (to appear)
Kwiatkowska, M., Norman, G., Parker, D.: PRISM: Probabilistic symbolic model checker. Technical Report 760/2001, University of Dortmund; also in Proc. PAPM/PROBMIV 2001 Tools Session (September 2001)
Millen, J., Ruess, H.: Protocol-independent secrecy. In: RSP: 21th IEEE Computer Society Symposium on Research in Security and Privacy (2000)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. In: CRC Press series on discrete mathematics and its applications. CRC Press, Boca Raton (1996) ISBN 0-8493-8523-7
Lawrence, C.P.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6, 85–128 (1998)
Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)
Rushby, J.: Combining system properties: A cautionary example and formal examination. Technical report, Computer Science Laboratory, SRI International (June 1995)
Saïdi, H.: Towards automatic synthesis of security protocols. In: Logic- Based Program Synthesis Workshop. AAAI 2002 Spring Symposium, Stanford University, California (March 2002)
Shmatikov, V.: Probabilistic analysis of anonymity. In: Proc. 15th IEEE Computer Security Foundations Workshop, pp. 119–128 (2002)
Zhou, J.: Non-repudiation. PhD thesis, University of London (December 1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saïdi, H., Stavridou, V., Duterte, B. (2005). Protocol Codesign. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2003. Lecture Notes in Computer Science, vol 3364. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11542322_14
Download citation
DOI: https://doi.org/10.1007/11542322_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28389-8
Online ISBN: 978-3-540-31836-1
eBook Packages: Computer ScienceComputer Science (R0)