TY - GEN
T1 - Computationally sound symbolic analysis of EAP-TNC protocol
AU - Zhang, Zijian
AU - Zhu, Liehuang
AU - Wang, Feng
AU - Liao, Lejian
AU - Guo, Cong
AU - Wang, Hongyuan
PY - 2012
Y1 - 2012
N2 - The Trusted Computing Group has proposed Trusted Network Connection (TNC) Architecture and a series of interface specifications, such as IF-T and IF-TNCCS, to solve the interoperability of network access control. In particular, IF-T describes the mapping of IF-TNCCS messages to a standard TNC Extensible Authentication Protocol (EAP) method. It includes specification of the standard EAP method called EAP-TNC. Since EAP-TNC is important to encapsulate TNCCS messages so that they can be carried over tunneled EAP methods, this paper proposes a computationally sound symbolic analysis of EAP-TNC protocol to prove composable security property.
AB - The Trusted Computing Group has proposed Trusted Network Connection (TNC) Architecture and a series of interface specifications, such as IF-T and IF-TNCCS, to solve the interoperability of network access control. In particular, IF-T describes the mapping of IF-TNCCS messages to a standard TNC Extensible Authentication Protocol (EAP) method. It includes specification of the standard EAP method called EAP-TNC. Since EAP-TNC is important to encapsulate TNCCS messages so that they can be carried over tunneled EAP methods, this paper proposes a computationally sound symbolic analysis of EAP-TNC protocol to prove composable security property.
KW - Computationally Sound
KW - EAP-TNC
KW - Trusted Computing
KW - Trusted Network Connection
UR - http://www.scopus.com/inward/record.url?scp=84865684818&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-32298-3_8
DO - 10.1007/978-3-642-32298-3_8
M3 - Conference contribution
AN - SCOPUS:84865684818
SN - 9783642322976
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 113
EP - 128
BT - Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers
T2 - 3rd International Conference on Trusted Systems, INTRUST 2011
Y2 - 27 November 2011 through 29 November 2011
ER -