Proof of Logic: Correctness of Next Generation Security Mechanisms
Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY (Vol.9, No. 1)Publication Date: 2013-02-08
Authors : Danilo Bernardo;
Page : 964-975
Keywords : UDT; UDT-AO; UDT-DTLS; GSS-API; High-speed networks; PCL;
Abstract
In this paper, three security mechanisms developed to form the UDT (UDP-Data Transfer protocol) Security Architecture are evaluated and analyzed. An approach is utilized to ascertain the applicability and secrecy properties of the selected security mechanisms when implemented with UDT. In this approach, a formal proof of correctness, through formal composition logic is carried out. This approach is modular; it has a separate proof for each protocol section that provides insight into the network environment in which each section can be reliably employed. Moreover, the proof holds for a variety of failure recovery strategies and other implementation and configuration options.This paper is an? extension and a revised version of the works published by the author.
Other Latest Articles
- Overview of OLAP cubes, importance, build Considerations and querying with MDX.
- A Comparative Evaluation of approaches for Model Testability
- An Evaluation for Model Testability approaches
- A Scheduling Approach to Achieve Green Cloud Solution Based on Internet of Things
- An Offline SEO (Search Engine Optimization) Based Algorithm to Calculate Web Page Rank According to Different Parameters
Last modified: 2016-06-29 19:09:36