{"title":"为身份验证系统指定代理信念","authors":"Ji Ma, M. Orgun","doi":"10.1109/ECUMN.2007.49","DOIUrl":null,"url":null,"abstract":"The goal of an authentication system is to verify and authorise users, in order to protect restricted data and information. After authentication, two principals (people, computers, services) in a distributed system should be entitled to believe that they are communicating with each other and not with intruders. Therefore it is important to express such beliefs precisely and to capture the reasoning that leads to them. In this paper, we focus on analysis of agent beliefs in dynamic environments in a formal framework based on a combination of a belief logic with a temporal logic. Through a well-known protocol example, that is, Kerberos, we discuss how to express principal agent beliefs involved in authentication protocols and the evolution of these beliefs as a consequence of communication, since trust is based on a series of observations of agents. Our approach is general and could be used for designing, verifying and implementing authentication protocols","PeriodicalId":202819,"journal":{"name":"Fourth European Conference on Universal Multiservice Networks (ECUMN'07)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Specifying Agent Beliefs for Authentication Systems\",\"authors\":\"Ji Ma, M. Orgun\",\"doi\":\"10.1109/ECUMN.2007.49\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The goal of an authentication system is to verify and authorise users, in order to protect restricted data and information. After authentication, two principals (people, computers, services) in a distributed system should be entitled to believe that they are communicating with each other and not with intruders. Therefore it is important to express such beliefs precisely and to capture the reasoning that leads to them. In this paper, we focus on analysis of agent beliefs in dynamic environments in a formal framework based on a combination of a belief logic with a temporal logic. Through a well-known protocol example, that is, Kerberos, we discuss how to express principal agent beliefs involved in authentication protocols and the evolution of these beliefs as a consequence of communication, since trust is based on a series of observations of agents. Our approach is general and could be used for designing, verifying and implementing authentication protocols\",\"PeriodicalId\":202819,\"journal\":{\"name\":\"Fourth European Conference on Universal Multiservice Networks (ECUMN'07)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-02-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fourth European Conference on Universal Multiservice Networks (ECUMN'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECUMN.2007.49\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fourth European Conference on Universal Multiservice Networks (ECUMN'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECUMN.2007.49","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Specifying Agent Beliefs for Authentication Systems
The goal of an authentication system is to verify and authorise users, in order to protect restricted data and information. After authentication, two principals (people, computers, services) in a distributed system should be entitled to believe that they are communicating with each other and not with intruders. Therefore it is important to express such beliefs precisely and to capture the reasoning that leads to them. In this paper, we focus on analysis of agent beliefs in dynamic environments in a formal framework based on a combination of a belief logic with a temporal logic. Through a well-known protocol example, that is, Kerberos, we discuss how to express principal agent beliefs involved in authentication protocols and the evolution of these beliefs as a consequence of communication, since trust is based on a series of observations of agents. Our approach is general and could be used for designing, verifying and implementing authentication protocols