![]() Mauw, Sjouke ![]() ![]() in Proc. 4th Conference on Principles of Security and Trust (POST'15) (2015) Multi-party contract signing (MPCS) protocols allow a group of signers to exchange signatures on a predefined contract. Previous approaches considered either completely linear protocols or fully parallel ... [more ▼] Multi-party contract signing (MPCS) protocols allow a group of signers to exchange signatures on a predefined contract. Previous approaches considered either completely linear protocols or fully parallel broadcasting protocols. We introduce the new class of DAG MPCS protocols which combines parallel and linear execution and allows for parallelism even within a signer role. This generalization is useful in practical applications where the set of signers has a hierarchical structure, such as chaining of service level agreements and subcontracting. Our novel DAG MPCS protocols are represented by directed acyclic graphs and equipped with a labeled transition system semantics. We define the notion of abort-chaining sequences and prove that a DAG MPCS protocol satisfies fairness if and only if it does not have an abortchaining sequence. We exhibit several examples of optimistic fair DAG MPCS protocols. The fairness of these protocols follows from our theory and has additionally been verified with our automated tool. We define two complexity measures for DAG MPCS protocols, related to execution time and total number of messages exchanged. We prove lower bounds for fair DAG MPCS protocols in terms of these measures. [less ▲] Detailed reference viewed: 130 (0 UL)![]() Jonker, Hugo ![]() ![]() ![]() in 23rd Security Protocols Workshop (2015) Detailed reference viewed: 126 (5 UL)![]() Kordy, Barbara ![]() ![]() ![]() in Journal of Logic and Computation (2012) Attack-defense trees are a novel methodology for graphical security modeling and assessment. They extend the well known formalism of attack trees by allowing nodes that represent defensive measures to ... [more ▼] Attack-defense trees are a novel methodology for graphical security modeling and assessment. They extend the well known formalism of attack trees by allowing nodes that represent defensive measures to appear at any level of the tree. This enlarges the modeling capabilities of attack trees and makes the new formalism suitable for representing interactions between an attacker and a defender. Our formalization supports different semantical approaches for which we provide usage scenarios. We also formalize how to quantitatively analyze attack and defense scenarios using attributes. [less ▲] Detailed reference viewed: 207 (15 UL)![]() Kordy, Barbara ![]() ![]() in Computer Security Foundations (CSF 2012) (2012) Detailed reference viewed: 153 (0 UL)![]() van Deursen, Ton ![]() ![]() in EuroPKI 2011 (2012) Detailed reference viewed: 106 (2 UL)![]() van Deursen, Ton ![]() ![]() ![]() in Abstract book of 20th USENIX Security Symposium (2011) Detailed reference viewed: 47 (1 UL)![]() Mauw, Sjouke ![]() ![]() ![]() in Proc. 18th Security Protocols Workshop (2010) Detailed reference viewed: 295 (8 UL)![]() ; Lenzini, Gabriele ![]() ![]() in Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (2010) We introduce and comment on the concept of contextual pseudo identity. A contextual pseudo identity is a soft identity token that is built from both a user's biometric and the context. When it comes to ... [more ▼] We introduce and comment on the concept of contextual pseudo identity. A contextual pseudo identity is a soft identity token that is built from both a user's biometric and the context. When it comes to ubiquitous authentication, a contextual pseudo identity promises better security than that o ered by traditional biometrics-based identity tokens: the use of context improves the tokens' disposability and renewability, which are two essential properties in the protection of a user's real identity. Our algorithm for generating contextual pseudo identities extends a Fuzzy Embedder so that it accepts both biometric and context dependent input. We prove that our way of processing the context preserves the security and reliability properties of the Fuzzy Embedder used in our extension. An example shows how a user can utilize contextual pseudo identity to authenticate to and access ubiquitous services. [less ▲] Detailed reference viewed: 181 (6 UL)![]() van Deursen, Ton ![]() ![]() in 6th Workshop on RFID Security (RFIDSec 2010) (2010) Detailed reference viewed: 92 (0 UL)![]() Kordy, Barbara ![]() ![]() ![]() in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (2010) We introduce and give formal definitions of attack–defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic ... [more ▼] We introduce and give formal definitions of attack–defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical approaches. We present several semantics for attack–defense trees along with usage scenarios, and we show how to evaluate attributes. [less ▲] Detailed reference viewed: 132 (3 UL)![]() van Deursen, Ton ![]() ![]() in Information Processing Letters (2009), 110(2), 57-61 Detailed reference viewed: 98 (0 UL)![]() van Deursen, Ton ![]() ![]() in Third IFIP WG 11.2 International Workshop (2009) Detailed reference viewed: 96 (0 UL)![]() van Deursen, Ton ![]() ![]() in Electronic Notes in Theoretical Computer Science (2009), 244 Detailed reference viewed: 113 (1 UL)![]() Alcalde, Baptiste ![]() ![]() in Proc. 7th Australasian Information Security Conference - AISC'09 (2009) Detailed reference viewed: 49 (0 UL)![]() Mauw, Sjouke ![]() ![]() in Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09) (2009) Detailed reference viewed: 106 (0 UL)![]() van Deursen, Ton ![]() ![]() ![]() in Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (2009) Detailed reference viewed: 107 (0 UL)![]() Alcalde, Baptiste ![]() ![]() in Seventh Australasian Information Security Conference (AISC 2009) (2009) Detailed reference viewed: 105 (0 UL)![]() van Deursen, Ton ![]() ![]() ![]() in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (2008) Detailed reference viewed: 116 (0 UL)![]() Ceelen, Pieter ![]() ![]() ![]() in Electronic Notes in Theoretical Computer Science (2008), 197(2), 31-43 In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all ... [more ▼] In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all significant protocol verification frameworks based on formal methods. We identify and classify new type-flaw attacks arising from this capability. Several examples of protocols that are vulnerable to this type of attack are given, including Lowe’s modification of KSL. The consequences for automatic verification tools are discussed. [less ▲] Detailed reference viewed: 127 (0 UL)![]() ![]() van Deursen, Ton ![]() ![]() in Proceedings of the 1st Workshop on Advances in RFID, AIR'08 (2008) Detailed reference viewed: 112 (1 UL) |
||