MIME-Version: 1.0 Server: CERN/3.0 Date: Tuesday, 07-Jan-97 15:55:05 GMT Content-Type: text/html Content-Length: 4987 Last-Modified: Friday, 01-Mar-96 21:21:33 GMT Network Security

Network Security


To enhance the security of networked systems, we proposed a security architecture together with novel protocols for authentication, called Texas Authentication Protocols (TAPs), and a new language for authorization, called Generalized Access Control List (GACL). A proof methodology for verifying authentication protocols based upon state transition semantics has been developed. A high level abstraction for secure network programming (SNP), designed to resemble a socket interface, has been implemented.

Recent papers

  1. SNP : An interface for secure network programming
    Thomas Y.C. Woo, Raghuram Bindignavle, Shaowen Su and Simon S. Lam
    Proc. USENIX '94 Summer Technical Conference, Boston, June 1994
  2. Design, verification and implementation of an authentication protocol
    Thomas Y.C. Woo and Simon S. Lam
    Proc. Int. Conference on Network Protocols, Boston, October 1994
  3. Authorization in distributed systems: A new approach
    Thomas Y.C. Woo and Simon S. Lam
    Journal of Computer Security, 1994
  4. A lesson in authentication protocol design
    Thomas Y.C. Woo and Simon S. Lam
    ACM Operating Systems Review, vol. 28, no. 3, 1994
  5. A framework for distributed authorization
    Thomas Y.C. Woo and Simon S. Lam
    Proc. ACM Conference on Computer and Communications Security, Fairfax, Virginia, November 1993
  6. Verifying authentication protocols: Methodology and example
    Thomas Y. C. Woo and Simon S. Lam
    Proc. Int. Conference on Network Protocols, San Francisco, October 1993
  7. A semantic model for authentication protocols
    Thomas Y. C. Woo and Simon S. Lam
    Proc. IEEE Symposium on Research in Security and Privacy, Oakland, May 1993
  8. Authorization in distributed systems: A formal approach
    Thomas Y.C. Woo and Simon S. Lam
    Proc. IEEE Symposium on Research in Security and Privacy, Oakland, May 1992
  9. Applying a theory of modules and interfaces to security verification
    Simon S. Lam, A. Udaya Shankar, and Thomas Y. C. Woo
    Proc. IEEE Symposium on Research in Security and Privacy, Oakland, May 1991
  10. Authentication revisited
    Thomas Y.C. Woo and Simon S. Lam
    Computer, vol. 25, no. 3, page 10, March 1992
    (first publication of authentication protocol implemented in SNP)

  11. Authentication for distributed systems
    Thomas Y.C. Woo and Simon S. Lam
    Computer, vol. 25, no. 1, pp. 39-52, January 1992