Click here for full text:
From Security Protocols to Systems Security : Making a case for systems security modelling
Keyword(s): security protocols; systems security; SSML
Abstract: When applying information security, we need to go beyond the analysis of individual security protocols and consider how they are used within distributed systems, software applications and services. Important as they are, security protocols only form a part of the overall security engineering design for a particular distributed system. The effective use of any security protocol will typically depend upon certain structural data such as key information being available for use by some - and at the same time made unavailable to others. Systems need to be designed with requirements like these in mind.
Back to Index