Reference : Towards the Orchestration of Secured Services under Non-disclosure Policies
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/3845
Towards the Orchestration of Secured Services under Non-disclosure Policies
English
Avanesov, Tigran mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Chevalier, Yannick [IRIT, Université de Toulouse, France]
Rusinowitch, Michaël [INRIA Nancy Grand Est, France]
Turuani, Mathieu [INRIA Nancy Grand Est, France]
2012
6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
Springer Berlin / Heidelberg
130-145
Yes
978-3-642-33703-1
6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012
Oct 17, 2012 - Oct 20, 2012
St. Petersburg
Russia
[en] Web services ; Orchestration ; security policy ; separation of duty ; deducibility constraints ; cryptographic protocols
[en] The problem of finding a mediator to compose secured services has been reduced in our former work to the problem of solving deducibility constraints similar to those employed for cryptographic protocol analysis. We extend in this paper the mediator synthesis procedure by a construction for expressing that some data is not accessible to the mediator. Then we give a decision procedure for verifying that a mediator satisfying this non-disclosure policy can be effectively synthesized. This procedure has been implemented in CL-AtSe, our protocol analysis tool. The procedure extends constraint solving for cryptographic protocol analysis in a significative way as it is able to handle negative deducibility constraints without restriction. In particular it applies to all subterm convergent theories and therefore covers several interesting theories in formal security analysis including encryption, hashing, signature and pairing.
http://hdl.handle.net/10993/3845
10.1007/978-3-642-33704-8_12
http://www.springerlink.com/content/n76672n162314465/
7531
Computer Network Security, Lecture Notes in Computer Science

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
10.1007_978-3-642-33704-8_12.pdfPublisher postprint302.02 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.