On the security validation of integrated security solutions

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Combining security solutions in order to achieve stronger (combined) security properties is not straightforward. This paper shows that security-preserving alphabetic language homomorphisms can be used to derive security results for combined security solutions. A relatively simple example of the combination of two different authentication properties (device authentication using a trusted platform module and user authentication using SSL) are integrated. Using security-preserving language homomorphisms it is shown that previously proposed combinations of solutions do not satisfy the desired integrated security properties. Finally, an improved integration of the two solutions is shown to satisfy the desired properties. © IFIP International Federation for Information Processing 2009.

Cite

CITATION STYLE

APA

Fuchs, A., Gürgens, S., & Rudolph, C. (2009). On the security validation of integrated security solutions. In IFIP Advances in Information and Communication Technology (Vol. 297, pp. 190–201). https://doi.org/10.1007/978-3-642-01244-0_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free