Computationally sound symbolic analysis of EAP-TNC protocol

Zijian Zhang, Liehuang Zhu*, Feng Wang, Lejian Liao, Cong Guo, Hongyuan Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

The Trusted Computing Group has proposed Trusted Network Connection (TNC) Architecture and a series of interface specifications, such as IF-T and IF-TNCCS, to solve the interoperability of network access control. In particular, IF-T describes the mapping of IF-TNCCS messages to a standard TNC Extensible Authentication Protocol (EAP) method. It includes specification of the standard EAP method called EAP-TNC. Since EAP-TNC is important to encapsulate TNCCS messages so that they can be carried over tunneled EAP methods, this paper proposes a computationally sound symbolic analysis of EAP-TNC protocol to prove composable security property.

Original languageEnglish
Title of host publicationTrusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers
Pages113-128
Number of pages16
DOIs
Publication statusPublished - 2012
Event3rd International Conference on Trusted Systems, INTRUST 2011 - Beijing, China
Duration: 27 Nov 201129 Nov 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7222 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Trusted Systems, INTRUST 2011
Country/TerritoryChina
CityBeijing
Period27/11/1129/11/11

Keywords

  • Computationally Sound
  • EAP-TNC
  • Trusted Computing
  • Trusted Network Connection

Fingerprint

Dive into the research topics of 'Computationally sound symbolic analysis of EAP-TNC protocol'. Together they form a unique fingerprint.

Cite this