79,695 research outputs found

    Attacking Group Protocols by Refuting Incorrect Inductive Conjectures

    Get PDF
    Automated tools for finding attacks on flawed security protocols often fail to deal adequately with group protocols. This is because the abstractions made to improve performance on fixed 2 or 3 party protocols either preclude the modelling of group protocols all together, or permit modelling only in a fixed scenario, which can prevent attacks from being discovered. This paper describes Coral, a tool for finding counterexamples to incorrect inductive conjectures, which we have used to model protocols for both group key agreement and group key management, without any restrictions on the scenario. We will show how we used Coral to discover 6 previously unknown attacks on 3 group protocols

    A Peered Bulletin Board for Robust Use in Verifiable Voting Systems

    Get PDF
    The Web Bulletin Board (WBB) is a key component of verifiable election systems. It is used in the context of election verification to publish evidence of voting and tallying that voters and officials can check, and where challenges can be launched in the event of malfeasance. In practice, the election authority has responsibility for implementing the web bulletin board correctly and reliably, and will wish to ensure that it behaves correctly even in the presence of failures and attacks. To ensure robustness, an implementation will typically use a number of peers to be able to provide a correct service even when some peers go down or behave dishonestly. In this paper we propose a new protocol to implement such a Web Bulletin Board, motivated by the needs of the vVote verifiable voting system. Using a distributed algorithm increases the complexity of the protocol and requires careful reasoning in order to establish correctness. Here we use the Event-B modelling and refinement approach to establish correctness of the peered design against an idealised specification of the bulletin board behaviour. In particular we show that for n peers, a threshold of t > 2n/3 peers behaving correctly is sufficient to ensure correct behaviour of the bulletin board distributed design. The algorithm also behaves correctly even if honest or dishonest peers temporarily drop out of the protocol and then return. The verification approach also establishes that the protocols used within the bulletin board do not interfere with each other. This is the first time a peered web bulletin board suite of protocols has been formally verified.Comment: 49 page

    Evaluation of Sheffield City Council's Community Justice Panels Project

    Get PDF
    This report is the output of an evaluation commissioned by Sheffield City Council and undertaken by the Hallam Centre for Community Justice at Sheffield Hallam University. The evaluation was undertaken during October and November 2009 with the objectives of assessing the effectiveness of the Community Justice Panels project so far and providing recommendations for future development. The evaluation used an action research methodology and included documentary analysis, semi-structured interviews with strategic partners and stakeholders, wrongdoers and harmed persons, facilitator focus group and observation of the Panels

    Effective Caching for the Secure Content Distribution in Information-Centric Networking

    Full text link
    The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective since encrypted content stored in a cache is useless for any consumer except those who know the encryption key. For effective caching of encrypted content in ICN, we propose a novel scheme, called the Secure Distribution of Protected Content (SDPC). SDPC ensures that only authenticated consumers can access the content. The SDPC is a lightweight authentication and key distribution protocol; it allows consumer nodes to verify the originality of the published article by using a symmetric key encryption. The security of the SDPC was proved with BAN logic and Scyther tool verification.Comment: 7 pages, 9 figures, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring

    CRFM Consultancy Report on Review of Existing Policy, Legal and Institutional Arrangements for Governance and Management of Flyingfish Fisheries in the Caribbean Large Marine Ecosystem

    Get PDF
    Many of the marine resources in the Caribbean are considered to be fully or overexploited. A Transboundary Diagnostic Analysis identified three priority transboundary problems that affect the CLME: unsustainable exploitation of fish and other living resources, the degradation and modification of natural habitats, pollution and contamination. The fourwing flyingfish fishery is the single most important small pelagic fishery in the southern Lesser Antilles. It is a shared resource, which has been traditionally exploited by seven different States, i.e. Barbados, Dominica, Grenada, Martinique, Saint Lucia, Saint Vincent and the Grenadines and Trinidad and Tobago. With expanding fleet capacity and limited cooperation among the States exploiting the flyingfish, there is concern that the resource may become overfished. While the flyingfish fishery is a directed fishery, it is at the same time part of a multi-species, multi-gear fishery, which also targets regional large pelagic species.This case study identifies and analyses the priority transboundary problems and issues. The policy, legal and institutional reforms needed to address such transboundary issues and achieve long-term conservation and sustainable use of the resources are also identified. A major and necessary component of the case study is an evaluation of the existing policy cycles and linkages among the countries and institutions involved with the flyingfish fishery
    • ā€¦
    corecore