Computationally sound symbolic analysis of EAP-TNC protocol

Zijian Zhang, Liehuang Zhu*, Feng Wang, Lejian Liao, Cong Guo, Hongyuan Wang

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

2 引用 (Scopus)

摘要

The Trusted Computing Group has proposed Trusted Network Connection (TNC) Architecture and a series of interface specifications, such as IF-T and IF-TNCCS, to solve the interoperability of network access control. In particular, IF-T describes the mapping of IF-TNCCS messages to a standard TNC Extensible Authentication Protocol (EAP) method. It includes specification of the standard EAP method called EAP-TNC. Since EAP-TNC is important to encapsulate TNCCS messages so that they can be carried over tunneled EAP methods, this paper proposes a computationally sound symbolic analysis of EAP-TNC protocol to prove composable security property.

源语言英语
主期刊名Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers
113-128
页数16
DOI
出版状态已出版 - 2012
活动3rd International Conference on Trusted Systems, INTRUST 2011 - Beijing, 中国
期限: 27 11月 201129 11月 2011

出版系列

姓名Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
7222 LNCS
ISSN(印刷版)0302-9743
ISSN(电子版)1611-3349

会议

会议3rd International Conference on Trusted Systems, INTRUST 2011
国家/地区中国
Beijing
时期27/11/1129/11/11

指纹

探究 'Computationally sound symbolic analysis of EAP-TNC protocol' 的科研主题。它们共同构成独一无二的指纹。

引用此