18 research outputs found

    Security mechanisms in high-level network protocols

    No full text
    The implications of adding security mechanisms to high-level network protocols operating in an open-system environment are analyzed. First the threats to security that may arise in such an environment are described, and then a set of goals for communications security measures is established. This is followed by a brief description of the two basi

    Formally-Based Black-Box Monitoring of Security Protocols

    No full text
    Abstract. In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that stop insecure protocol runs executed by such legacy implementations, without the need of their source code. We validate the approach at a case study about monitoring several SSL legacy implementations. Recently, a security bug has been found in the widely deployed OpenSSL client; our case study shows that our monitor correctly stops the protocol runs otherwise allowed by the faulty OpenSSL client. Moreover, our monitoring approach allowed us to detect a new flaw in another open source SSL client implementation.

    Design of Interfactory Computer Network Interconnection

    No full text

    Communication security in a distributed network

    No full text

    A matrix key-distribution scheme

    No full text
    corecore