MIME-Version: 1.0
Server: CERN/3.0
Date: Tuesday, 07-Jan-97 15:55:05 GMT
Content-Type: text/html
Content-Length: 4987
Last-Modified: Friday, 01-Mar-96 21:21:33 GMT
Network Security
Network Security
To enhance the security of networked systems, we proposed a security
architecture together with novel protocols for authentication,
called Texas Authentication Protocols (TAPs), and a new language
for authorization, called Generalized Access Control List (GACL).
A proof methodology for verifying authentication protocols based upon
state transition semantics has been developed. A high level abstraction
for secure network programming (SNP), designed to resemble a socket interface,
has been implemented.
Recent papers
- SNP : An interface for secure network programming
Thomas Y.C. Woo, Raghuram Bindignavle, Shaowen Su and Simon S. Lam
Proc. USENIX '94 Summer Technical Conference,
Boston, June 1994
- Design, verification and implementation of an authentication
protocol
Thomas Y.C. Woo and Simon S. Lam
Proc. Int. Conference on Network Protocols,
Boston, October 1994
- Authorization in distributed systems: A new approach
Thomas Y.C. Woo and Simon S. Lam
Journal of Computer Security, 1994
- A lesson in authentication protocol design
Thomas Y.C. Woo and Simon S. Lam
ACM Operating Systems Review, vol. 28, no. 3, 1994
- A framework for distributed authorization
Thomas Y.C. Woo and Simon S. Lam
Proc. ACM Conference on Computer and Communications Security,
Fairfax, Virginia, November 1993
- Verifying authentication protocols: Methodology and example
Thomas Y. C. Woo and Simon S. Lam
Proc. Int. Conference on Network Protocols,
San Francisco, October 1993
- A semantic model for authentication protocols
Thomas Y. C. Woo and Simon S. Lam
Proc. IEEE Symposium on Research in Security and Privacy,
Oakland, May 1993
- Authorization in distributed systems: A formal approach
Thomas Y.C. Woo and Simon S. Lam
Proc. IEEE Symposium on Research in Security and Privacy,
Oakland, May 1992
- Applying a theory of modules and interfaces to security verification
Simon S. Lam, A. Udaya Shankar, and Thomas Y. C. Woo
Proc. IEEE Symposium on Research in Security and Privacy,
Oakland, May 1991
- Authentication revisited
Thomas Y.C. Woo and Simon S. Lam
Computer, vol. 25, no. 3, page 10, March 1992
(first publication of authentication protocol implemented in SNP)
- Authentication for distributed systems
Thomas Y.C. Woo and Simon S. Lam
Computer, vol. 25, no. 1, pp. 39-52, January 1992