Specifying agent beliefs for authentication systems

Ji Ma*, Mehmet A. Orgun

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

3 Citations (Scopus)
20 Downloads (Pure)


The goal of an authentication system is to verify and authorise users, in order to protect restricted data and information. After authentication, two principals (people, computers, services) in a distributed system should be entitled to believe that they are communicating with each other and not with intruders. Therefore it is important to express such beliefs precisely and to capture the reasoning that leads to them. In this paper, we focus on analysis of agent beliefs in dynamic environments in a formal framework based on a combination of a belief logic with a temporal logic. Through a well-known protocol example, that is, Kerberos, we discuss how to express principal agent beliefs involved in authentication protocols and the evolution of these beliefs as a consequence of communication, since trust is based on a series of observations of agents. Our approach is general and could be used for designing, verifying and implementing authentication protocols.

Original languageEnglish
Title of host publicationProceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks
EditorsZoubir Mammeri, Prosper Chemouil, Pascal Lorenz, Annie Gravey
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages9
ISBN (Print)076952768X, 9780769527680
Publication statusPublished - 2007
EventECUMN 2007: Fourth European Conference on Universal Multiservice Networks - Toulouse, France
Duration: 14 Feb 200716 Feb 2007


OtherECUMN 2007: Fourth European Conference on Universal Multiservice Networks

Bibliographical note

Copyright 2007 IEEE. Reprinted from Proceedings of the fourth European conference on universal multiservice networks (ECUMN 2007). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.


Dive into the research topics of 'Specifying agent beliefs for authentication systems'. Together they form a unique fingerprint.

Cite this