Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Formal Verification of the xDAuth Protocol
Department of Computer Sciences, Institute of Management Sciences, Peshawar.
Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
Vise andre og tillknytning
2016 (engelsk)Inngår i: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 11, nr 9, s. 1956-1969Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Service Oriented Architecture (SOA) offers a flexible paradigm for information flow among collaborating organizations. As information moves out of an organization boundary, various security concerns may arise, such as confidentiality, integrity, and authenticity that needs to be addressed. Moreover, verifying the correctness of the communication protocol is also an important factor. This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. We have modeled the information flow of xDAuth protocol using High Level Petri Nets (HLPN) to understand protocol information flow in a distributed environment. We analyze the rules of information flow using Z language while Z3 SMT solver is used for verification of the model. Our formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties, e.g. secure secret key authentication, Chinese wall security policy and secrecy specific properties, e.g. confidentiality, integrity, authenticity.

sted, utgiver, år, opplag, sider
2016. Vol. 11, nr 9, s. 1956-1969
HSV kategori
Forskningsprogram
Distribuerade datorsystem
Identifikatorer
URN: urn:nbn:se:ltu:diva-15379DOI: 10.1109/TIFS.2016.2561909Lokal ID: ee2c8aa4-cf41-4453-b735-f73bafee1a96OAI: oai:DiVA.org:ltu-15379DiVA, id: diva2:988353
Merknad
Validerad; 2016; Nivå 2; 20160622 (andbra)Tilgjengelig fra: 2016-09-29 Laget: 2016-09-29 Sist oppdatert: 2018-01-10bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekst

Søk i DiVA

Av forfatter/redaktør
Vasilakos, Athanasios
Av organisasjonen
I samme tidsskrift
IEEE Transactions on Information Forensics and Security

Søk utenfor DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric

doi
urn-nbn
Totalt: 53 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf