Towards the orchestration of secured services under non-disclosure policies

2Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The problem of finding a mediator to compose secured services has been reduced in our former work to the problem of solving deducibility constraints similar to those employed for cryptographic protocol analysis. We extend in this paper the mediator synthesis procedure by a construction for expressing that some data is not accessible to the mediator. Then we give a decision procedure for verifying that a mediator satisfying this non-disclosure policy can be effectively synthesized. This procedure has been implemented in CL-AtSe, our protocol analysis tool. The procedure extends constraint solving for cryptographic protocol analysis in a significative way as it is able to handle negative deducibility constraints without restriction. In particular it applies to all subterm convergent theories and therefore covers several interesting theories in formal security analysis including encryption, hashing, signature and pairing. © 2012 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Avanesov, T., Chevalier, Y., Rusinowitch, M., & Turuani, M. (2012). Towards the orchestration of secured services under non-disclosure policies. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7531 LNCS, pp. 130–145). Springer Verlag. https://doi.org/10.1007/978-3-642-33704-8_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free