Reference Hub3
Designing Security Properties-Centric Communication Protocols using a Component-Based Approach

Designing Security Properties-Centric Communication Protocols using a Component-Based Approach

N. Nobelis, K. Boudaoud, C. Delettre, M. Riveill
Copyright: © 2012 |Volume: 3 |Issue: 1 |Pages: 16
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781466611757|DOI: 10.4018/jdst.2012010101
Cite Article Cite Article

MLA

Nobelis, N., et al. "Designing Security Properties-Centric Communication Protocols using a Component-Based Approach." IJDST vol.3, no.1 2012: pp.1-16. http://doi.org/10.4018/jdst.2012010101

APA

Nobelis, N., Boudaoud, K., Delettre, C., & Riveill, M. (2012). Designing Security Properties-Centric Communication Protocols using a Component-Based Approach. International Journal of Distributed Systems and Technologies (IJDST), 3(1), 1-16. http://doi.org/10.4018/jdst.2012010101

Chicago

Nobelis, N., et al. "Designing Security Properties-Centric Communication Protocols using a Component-Based Approach," International Journal of Distributed Systems and Technologies (IJDST) 3, no.1: 1-16. http://doi.org/10.4018/jdst.2012010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Numerous communication protocols have been designed offering a set of security properties through the use of cryptographic tools to secure electronic document transfer. However, there is no clear match between the tools used and security properties they offer. To solve this problem, the authors propose to use a component-based approach; more specifically the authors introduce the notion of high-level security component where each component provides an atomic security property. This approach will facilitate the design of new protocols that fulfill any specific set of security properties by assembling the appropriate components. At the same time, users using a protocol designed with these security components will have the assurance that the protocol satisfies the security properties required for the electronic document transfer. The authors validate the approach by showing how the integrity property can be added to the HTTP protocol to design a security property-centric HTTPS and in this case an integrity-only HTTPS.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.