Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems

Orgun, M. A., Ma, J., Liu, C. and Governatori, G. (2006). Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. In: Y. Dai, M. Hinkey and Y.Pan, Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06). 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Indiana University, Purdue University, Indianapolis, (325-332). 29 September 29 - 1 October, 2006.

Attached Files (Some files may be inaccessible until you login with your UQ eSpace credentials)
Name Description MIMEType Size Downloads
dasc.pdf dasc.pdf application/pdf 140.79KB 382

Author Orgun, M. A.
Ma, J.
Liu, C.
Governatori, G.
Title of paper Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems
Conference name 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06)
Conference location Indiana University, Purdue University, Indianapolis
Conference dates 29 September 29 - 1 October, 2006
Proceedings title Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06)
Journal name DASC 2006: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, Proceedings
Place of Publication California, USA
Publisher IEEE Computer Society
Publication Year 2006
Sub-type Fully published paper
DOI 10.1109/DASC.2006.19
ISBN 0-7695-2539-3
Editor Y. Dai
M. Hinkey
Y.Pan
Volume 1
Issue 1
Start page 325
End page 332
Total pages 8
Collection year 2006
Language eng
Abstract/Summary In stream authentication protocols used for large-scale data dissemination in autonomuous systems, authentication is based on the timing of the publication of keys, and depends on trust of the receiver in the sender and belief on whether an intruder can have prior knowledge of a key before it is published by a protocol. Many existing logics and approaches have successfully been applied to specify other types of authentication protocols, but most of them are not appropriate for analysing stream authentication protocols. We therefore consider a fibred modal logic that combines a belief logic with a linear-time temporal logic which can be used to analyse time-varying aspects of certain problems. With this logical system one is able to build theories of trust for analysing stream authentication protocols, which can deal with not only agent beliefs but also the timing properties of an autonomous agent-based system.
Subjects 280505 Data Security
E1
280200 Artificial Intelligence and Signal and Image Processing
780100 Non-oriented Research
Keyword security protocols
autonomous agents
TESLA
Q-Index Code E1
Additional Notes Copyright (c) 2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

 
Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in Thomson Reuters Web of Science Article
Scopus Citation Count Cited 3 times in Scopus Article | Citations
Google Scholar Search Google Scholar
Access Statistics: 167 Abstract Views, 382 File Downloads  -  Detailed Statistics
Created: Fri, 03 Nov 2006, 10:00:00 EST by Guido Governatori on behalf of School of Information Technol and Elec Engineering