Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Formal Verification of the xDAuth Protocol
Department of Computer Sciences, Institute of Management Sciences, Peshawar.
Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
Visa övriga samt affilieringar
2016 (Engelska)Ingår i: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 11, nr 9, s. 1956-1969Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Service Oriented Architecture (SOA) offers a flexible paradigm for information flow among collaborating organizations. As information moves out of an organization boundary, various security concerns may arise, such as confidentiality, integrity, and authenticity that needs to be addressed. Moreover, verifying the correctness of the communication protocol is also an important factor. This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. We have modeled the information flow of xDAuth protocol using High Level Petri Nets (HLPN) to understand protocol information flow in a distributed environment. We analyze the rules of information flow using Z language while Z3 SMT solver is used for verification of the model. Our formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties, e.g. secure secret key authentication, Chinese wall security policy and secrecy specific properties, e.g. confidentiality, integrity, authenticity.

Ort, förlag, år, upplaga, sidor
2016. Vol. 11, nr 9, s. 1956-1969
Nationell ämneskategori
Medieteknik
Forskningsämne
Distribuerade datorsystem
Identifikatorer
URN: urn:nbn:se:ltu:diva-15379DOI: 10.1109/TIFS.2016.2561909Scopus ID: 2-s2.0-84978975669Lokalt ID: ee2c8aa4-cf41-4453-b735-f73bafee1a96OAI: oai:DiVA.org:ltu-15379DiVA, id: diva2:988353
Anmärkning
Validerad; 2016; Nivå 2; 20160622 (andbra)Tillgänglig från: 2016-09-29 Skapad: 2016-09-29 Senast uppdaterad: 2018-07-10Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltextScopus

Sök vidare i DiVA

Av författaren/redaktören
Vasilakos, Athanasios
Av organisationen
Datavetenskap
I samma tidskrift
IEEE Transactions on Information Forensics and Security
Medieteknik

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetricpoäng

doi
urn-nbn
Totalt: 124 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf