2007
DOI: 10.1007/s10796-007-9049-0
|View full text |Cite
|
Sign up to set email alerts
|

Formalising theories of trust for authentication protocols

Abstract: This paper discusses a formal approach for establishing theories of trust for authentication systems which can be used to reason about how agent beliefs evolve through time. The goal of an authentication system is to verify and authorise users in order to protect restricted data and information, so trust is a critical issue for authentication systems. After authentication, two principals (people, computers, services) should be entitled to believe that they are communicating with each other and not with intrude… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…First, the mediator must be aware of the current context of application that may allow or forbid the opening of a particular type of negotiation process. Second, the mediator needs to take into consideration the user's reputation and/or trust properties to decide about the opening [18,22]. According to all this information, the mediator decides about accepting or declining the offer to open the new negotiation.…”
Section: The Purpose Of Facilitators the Mediator And Negotiation Tamentioning
confidence: 99%
“…First, the mediator must be aware of the current context of application that may allow or forbid the opening of a particular type of negotiation process. Second, the mediator needs to take into consideration the user's reputation and/or trust properties to decide about the opening [18,22]. According to all this information, the mediator decides about accepting or declining the offer to open the new negotiation.…”
Section: The Purpose Of Facilitators the Mediator And Negotiation Tamentioning
confidence: 99%
“…A trust theory for a given authentication system consists of a set of rules which can be used for reasoning about agent beliefs and security properties that the system may satisfy [13].…”
Section: A Generic Authentication Protocolsmentioning
confidence: 99%
“…We can refer to the property by nested applications of first and next as follows: first next n ϕ where next n is the n-folded application of next. We have also found this feature quite useful in the formalization of certain properties in authentication protocols such as those that state something occurred at a specific point in time [35,36].…”
Section: Sltlmentioning
confidence: 99%
“…MEL is more restrictive than TML in that nested belief modalities are not allowed in the logic, however, it is able to model agent beliefs as they are revealed through communication between agents. Similarly, we restrict ourselves to a multi-modal variant of KD because we have found that it is sufficient for representing the basic notions in the authentication (and communication) protocols we have studied [35,36], such as a message has been received from another agent, the message is believed to be reliable and/or authenticated. The protocols do not require any special condition for agent beliefs, other than the requirement that the agents are rational.…”
Section: Tmlmentioning
confidence: 99%
See 1 more Smart Citation