Specifying secure transport layers
Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide secure channels between hosts. In this paper we present a hierarchy of specifications for secure channels. We give trace specifications capturing a number of different con...
Main Authors: | , |
---|---|
Format: | Conference item |
Published: |
2008
|
_version_ | 1797051632566927360 |
---|---|
author | Dilloway, C Lowe, G |
author_facet | Dilloway, C Lowe, G |
author_sort | Dilloway, C |
collection | OXFORD |
description | Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide secure channels between hosts. In this paper we present a hierarchy of specifications for secure channels. We give trace specifications capturing a number of different confidentiality and authentication properties that secure channels might satisfy, and compare their strengths. We use the various modes of TLS as a running example, and we give examples of single-message protocols that we believe satisfy the channel specifications. © 2008 IEEE. |
first_indexed | 2024-03-06T18:22:18Z |
format | Conference item |
id | oxford-uuid:06b733df-86da-47d4-ae38-885e7a8d0afc |
institution | University of Oxford |
last_indexed | 2024-03-06T18:22:18Z |
publishDate | 2008 |
record_format | dspace |
spelling | oxford-uuid:06b733df-86da-47d4-ae38-885e7a8d0afc2022-03-26T09:03:56ZSpecifying secure transport layersConference itemhttp://purl.org/coar/resource_type/c_5794uuid:06b733df-86da-47d4-ae38-885e7a8d0afcSymplectic Elements at Oxford2008Dilloway, CLowe, GSecurity architectures often make use of secure transport protocols to protect network messages: the transport protocols provide secure channels between hosts. In this paper we present a hierarchy of specifications for secure channels. We give trace specifications capturing a number of different confidentiality and authentication properties that secure channels might satisfy, and compare their strengths. We use the various modes of TLS as a running example, and we give examples of single-message protocols that we believe satisfy the channel specifications. © 2008 IEEE. |
spellingShingle | Dilloway, C Lowe, G Specifying secure transport layers |
title | Specifying secure transport layers |
title_full | Specifying secure transport layers |
title_fullStr | Specifying secure transport layers |
title_full_unstemmed | Specifying secure transport layers |
title_short | Specifying secure transport layers |
title_sort | specifying secure transport layers |
work_keys_str_mv | AT dillowayc specifyingsecuretransportlayers AT loweg specifyingsecuretransportlayers |