This paper employs SVO logic to describe the interoperability protocols of GSI. As a successor of BAN logic, SVO logic can be used to assume certain goals a protocol must hold. Because the messages exchanged in a protocol depend on the credential format and encryption mechanism, these protocols are formalized in terms of protocol goals using the credential of X.509 certificates.
CITATION STYLE
Liu, H., & Li, M. (2004). SVO logic based formalisms of GSI protocols. In Lecture Notes in Computer Science (Vol. 3320, pp. 744–747). Springer Verlag. https://doi.org/10.1007/978-3-540-30501-9_145
Mendeley helps you to discover research relevant for your work.