2005
DOI: 10.1007/11542322_8
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Framework for Autonomic Security Protocols

Abstract: Abstract. This paper proposes a belief logic based approach that allows principals to negotiate and on-the-fly generate security protocols. When principals wish to interact then, rather than offering each other a fixed menu of 'known' protocols, they negotiate and generate a new protocol that is tailored specifically to their current security environment and requirements. This approach provides a basis for autonomic security protocols. Such protocols are self-configuring since only principal assumptions and pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2008
2008
2008
2008

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
(11 reference statements)
0
1
0
Order By: Relevance
“…S. N. Foley and H. Zhou proposed a belief logic approach that allows entities to realize onthe-fly generation of security protocols (Zhou and Foley, 2003). Their automatic security protocol generator uses logic-based synthesis rules to guide it in a backward search for suitable protocols from protocol goals (Foley and Zhou, 2003). Their tool is more efficient than the previous one; however, it is still too slow for the dynamic generation of security protocols because all possible states are searched to generate sub-protocols, and the number of potential protocol candidates is small because of binding free variables only to formulae from known assumptions inputted as a requirements for the security protocol.…”
Section: Related Workmentioning
confidence: 99%
“…S. N. Foley and H. Zhou proposed a belief logic approach that allows entities to realize onthe-fly generation of security protocols (Zhou and Foley, 2003). Their automatic security protocol generator uses logic-based synthesis rules to guide it in a backward search for suitable protocols from protocol goals (Foley and Zhou, 2003). Their tool is more efficient than the previous one; however, it is still too slow for the dynamic generation of security protocols because all possible states are searched to generate sub-protocols, and the number of potential protocol candidates is small because of binding free variables only to formulae from known assumptions inputted as a requirements for the security protocol.…”
Section: Related Workmentioning
confidence: 99%