Specifying secure transport layers

Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide secure channels between hosts. In this paper we present a hierarchy of specifications for secure channels. We give trace specifications capturing a number of different con...

Full description

Bibliographic Details
Main Authors: Dilloway, C, Lowe, G
Format: Conference item
Published: 2008
_version_ 1797051632566927360
author Dilloway, C
Lowe, G
author_facet Dilloway, C
Lowe, G
author_sort Dilloway, C
collection OXFORD
description Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide secure channels between hosts. In this paper we present a hierarchy of specifications for secure channels. We give trace specifications capturing a number of different confidentiality and authentication properties that secure channels might satisfy, and compare their strengths. We use the various modes of TLS as a running example, and we give examples of single-message protocols that we believe satisfy the channel specifications. © 2008 IEEE.
first_indexed 2024-03-06T18:22:18Z
format Conference item
id oxford-uuid:06b733df-86da-47d4-ae38-885e7a8d0afc
institution University of Oxford
last_indexed 2024-03-06T18:22:18Z
publishDate 2008
record_format dspace
spelling oxford-uuid:06b733df-86da-47d4-ae38-885e7a8d0afc2022-03-26T09:03:56ZSpecifying secure transport layersConference itemhttp://purl.org/coar/resource_type/c_5794uuid:06b733df-86da-47d4-ae38-885e7a8d0afcSymplectic Elements at Oxford2008Dilloway, CLowe, GSecurity architectures often make use of secure transport protocols to protect network messages: the transport protocols provide secure channels between hosts. In this paper we present a hierarchy of specifications for secure channels. We give trace specifications capturing a number of different confidentiality and authentication properties that secure channels might satisfy, and compare their strengths. We use the various modes of TLS as a running example, and we give examples of single-message protocols that we believe satisfy the channel specifications. © 2008 IEEE.
spellingShingle Dilloway, C
Lowe, G
Specifying secure transport layers
title Specifying secure transport layers
title_full Specifying secure transport layers
title_fullStr Specifying secure transport layers
title_full_unstemmed Specifying secure transport layers
title_short Specifying secure transport layers
title_sort specifying secure transport layers
work_keys_str_mv AT dillowayc specifyingsecuretransportlayers
AT loweg specifyingsecuretransportlayers