TY - GEN
T1 - Specifying agent beliefs for authentication systems
AU - Ma, Ji
AU - Orgun, Mehmet A.
N1 - Copyright 2007 IEEE. Reprinted from Proceedings of the fourth European conference on universal multiservice networks (ECUMN 2007). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
PY - 2007
Y1 - 2007
N2 - The goal of an authentication system is to verify and authorise users, in order to protect restricted data and information. After authentication, two principals (people, computers, services) in a distributed system should be entitled to believe that they are communicating with each other and not with intruders. Therefore it is important to express such beliefs precisely and to capture the reasoning that leads to them. In this paper, we focus on analysis of agent beliefs in dynamic environments in a formal framework based on a combination of a belief logic with a temporal logic. Through a well-known protocol example, that is, Kerberos, we discuss how to express principal agent beliefs involved in authentication protocols and the evolution of these beliefs as a consequence of communication, since trust is based on a series of observations of agents. Our approach is general and could be used for designing, verifying and implementing authentication protocols.
AB - The goal of an authentication system is to verify and authorise users, in order to protect restricted data and information. After authentication, two principals (people, computers, services) in a distributed system should be entitled to believe that they are communicating with each other and not with intruders. Therefore it is important to express such beliefs precisely and to capture the reasoning that leads to them. In this paper, we focus on analysis of agent beliefs in dynamic environments in a formal framework based on a combination of a belief logic with a temporal logic. Through a well-known protocol example, that is, Kerberos, we discuss how to express principal agent beliefs involved in authentication protocols and the evolution of these beliefs as a consequence of communication, since trust is based on a series of observations of agents. Our approach is general and could be used for designing, verifying and implementing authentication protocols.
UR - http://www.scopus.com/inward/record.url?scp=34547319032&partnerID=8YFLogxK
U2 - 10.1109/ECUMN.2007.49
DO - 10.1109/ECUMN.2007.49
M3 - Conference proceeding contribution
AN - SCOPUS:34547319032
SN - 076952768X
SN - 9780769527680
SP - 410
EP - 418
BT - Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks
A2 - Mammeri, Zoubir
A2 - Chemouil, Prosper
A2 - Lorenz, Pascal
A2 - Gravey, Annie
PB - Institute of Electrical and Electronics Engineers (IEEE)
CY - Piscataway, NJ
T2 - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks
Y2 - 14 February 2007 through 16 February 2007
ER -