Computationally sound symbolic analysis of EAP-TNC protocol

Zijian Zhang, Liehuang Zhu*, Feng Wang, Lejian Liao, Cong Guo, Hongyuan Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)
Plum Print visual indicator of research metrics
  • Citations
    • Citation Indexes: 2
  • Captures
    • Readers: 4
see details

Abstract

The Trusted Computing Group has proposed Trusted Network Connection (TNC) Architecture and a series of interface specifications, such as IF-T and IF-TNCCS, to solve the interoperability of network access control. In particular, IF-T describes the mapping of IF-TNCCS messages to a standard TNC Extensible Authentication Protocol (EAP) method. It includes specification of the standard EAP method called EAP-TNC. Since EAP-TNC is important to encapsulate TNCCS messages so that they can be carried over tunneled EAP methods, this paper proposes a computationally sound symbolic analysis of EAP-TNC protocol to prove composable security property.

Original languageEnglish
Title of host publicationTrusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers
Pages113-128
Number of pages16
DOIs
Publication statusPublished - 2012
Event3rd International Conference on Trusted Systems, INTRUST 2011 - Beijing, China
Duration: 27 Nov 201129 Nov 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7222 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Trusted Systems, INTRUST 2011
Country/TerritoryChina
CityBeijing
Period27/11/1129/11/11

Keywords

  • Computationally Sound
  • EAP-TNC
  • Trusted Computing
  • Trusted Network Connection

Fingerprint

Dive into the research topics of 'Computationally sound symbolic analysis of EAP-TNC protocol'. Together they form a unique fingerprint.

Cite this

Zhang, Z., Zhu, L., Wang, F., Liao, L., Guo, C., & Wang, H. (2012). Computationally sound symbolic analysis of EAP-TNC protocol. In Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers (pp. 113-128). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7222 LNCS). https://doi.org/10.1007/978-3-642-32298-3_8