A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS

In this paper, we present our line of research for defining an integrated framework for the specification and analysis of security and trust in complex and dynamic scenarios. We aim at showing how the same machinery applied for the formal verification of security protocols may be useful to model and analyze trust management procedures.

[1]  Fabio Martinelli,et al.  Analysis of security protocols as open systems , 2003, Theor. Comput. Sci..

[2]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[3]  Ninghui Li,et al.  Safety in Automated Trust Negotiation , 2004, IEEE Symposium on Security and Privacy.

[4]  Fabio Martinelli Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems , 2002, MFCS.

[5]  Simon N. Foley,et al.  Soft Constraints for Security , 2004, VODCA@FOSAD.

[6]  Fabio Martinelli,et al.  On Relating and Integrating Two Trust Management Frameworks , 2007, VODCA@FOSAD.

[7]  Martín Abadi,et al.  A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..

[8]  Fabio Martinelli,et al.  Towards an Integrated Formal Analysis for Security and Trust , 2005, FMOODS.

[9]  Roger Dingledine,et al.  Privacy enhancing technologies : Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002 : revised papers , 2003 .

[10]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[11]  Audun Jøsang,et al.  Simplification and analysis of transitive trust networks , 2006, Web Intell. Agent Syst..

[12]  Ninghui Li,et al.  Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..

[13]  Fabio Martinelli,et al.  Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques , 1999, TACAS.

[14]  Ninghui Li,et al.  Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[15]  Robin Milner,et al.  Communication and concurrency , 1989, PHI Series in computer science.

[16]  Marianne Winslett An Introduction to Automated Trust Establishment , 2002, GI Jahrestagung.

[17]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[18]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.