ref on crypto formalism
Eric, I dug out one of the references I was thinking of when you were talking last saturday. A summary of the introduction would go: "We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a "speaks for" relation between principals. A simple principal either has a name or is a communication channel; a compound principal can express an adopted role or delegation of authority. [...] We use the theory to explain many existing and proposed mechanisms for security [...]" So anyway, although I haven't read the whole thing in depth, it seems to me a reasonnable way to reason about complex security setups to make decisions about them (including automatically). %A Butler Lampson %A Martin Abadi %A Michael Burrows %A Edward Wobber %T authentication in distributed systems: theory and practice %J Operating Systems Review (ACM SIGOPS Review) %J Proceedings of the 13th ACM symposium on operating systems principles %C Pacific Grove, CA %D Oct. 13-16 1991 %V 25 %N 5 %P 165-182 %K transitive authentication, operating systems, DES, RSA, security, channel, RPC, remote procedure calls, public key encryption, name lookup, groups, access control, delegation, revocation, principals I'm pretty sure I saw somewhere a companion paper titled something like "An algebra of authentication"... hmmm maybe even in CACM... [...15 minutes later...] Unfortunately some of my CACMs are in hiding and not properly indexed... It was work done at DEC SRC in Palo Alto, there must be some research reports too. If somebody has refs for any of these, it would be great if you'd post them. Pierre. pierre@shell.portal.com
Pierre writes:
I'm pretty sure I saw somewhere a companion paper titled something like "An algebra of authentication"... hmmm maybe even in CACM... [...15 minutes later...] Unfortunately some of my CACMs are in hiding and not properly indexed... It was work done at DEC SRC in Palo Alto, there must be some research reports too.
If somebody has refs for any of these, it would be great if you'd post them.
http://ftp.digital.com/pub/DEC/SRC/research-reports/abstracts/src-rr-039.htm... SRC Research Report 39 A Logic of Authentication Michael Burrows, Martin Abadi, and Roger Needham February 28, 1989 48 pages http://ftp.digital.com/pub/DEC/SRC/research-reports/abstracts/src-rr-070.htm... SRC Research Report 70 A Calculus for Access Control in Distributed Systems M. Abadi, M. Burrows, B. Lampson, G. Plotkin March 4, 1991 52 pages http://ftp.digital.com/pub/DEC/SRC/research-reports/abstracts/src-rr-083.htm... SRC Research Report 83 Authentication in Distributed Systems: Theory and Practice Butler Lampson, Martin Abadi, Michael Burrows, Edward Wobber February 4, 1992 http://ftp.digital.com/pub/DEC/SRC/research-reports/abstracts/src-rr-117.htm... SRC Research Report 117 Authentication in the Taos Operating System Edward Wobber, Martin Abadi, Mike Burrows, and Butler Lampson December 10, 1993 38 pages
participants (2)
-
L. McCarthy -
Pierre Uszynski