2011
DOI: 10.1016/j.future.2010.12.003
|View full text |Cite
|
Sign up to set email alerts
|

Verifying a delegation protocol for grid systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
1
1
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(11 citation statements)
references
References 17 publications
0
11
0
Order By: Relevance
“…From our analysis in [4], we were able to show that |DT chain | > 1 in the case of four agents or more participating in the protocol. Since delegation is a form of trust, this vulnerability breaks the trust chain and does not preserve the deterministic delegation chain property of Section 2.…”
Section: Non-deterministic Delegation Chainsmentioning
confidence: 87%
See 2 more Smart Citations
“…From our analysis in [4], we were able to show that |DT chain | > 1 in the case of four agents or more participating in the protocol. Since delegation is a form of trust, this vulnerability breaks the trust chain and does not preserve the deterministic delegation chain property of Section 2.…”
Section: Non-deterministic Delegation Chainsmentioning
confidence: 87%
“…In [4], we carried out a verification of the DToken protocol using static analysis techniques based on abstract interpretation. The analysis revealed several vulnerabilities in the protocol, which we summarise in the following sections.…”
Section: Vulnerabilities Of the Current Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. protocol [6,8,17,24,25,7,4,27,5]. However, by its very nature, formal verification is an expensive process and requires a high level of expertise.…”
Section: Introductionmentioning
confidence: 99%
“…Other examples included [3,5]. In [5], the application of formal analysis was applied to another protocol in the project for achieving delegation of trust between users and resources. The analysis uncovered various flaws in the original protocol.…”
Section: Introductionmentioning
confidence: 99%