Security Analysis in RE-TRUST. Preliminary Security Analysis of the Entrusting Protocol

نویسنده

  • Igor Kotenko
چکیده

Current level of the open and distributed systems deployment and development implies the need of both security and trust analysis, in particular for Remote Entrusting approach developed in RE-TRUST Project. Research in this field is reflected in a large list of papers. And in various papers there are different understandings of such notions like «security analysis» and «trust analysis», related, as a rule, with the security of some system or its particular components and with the security of trust mechanisms correspondingly.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Study on the Relationship between Social Trust and Social Security in Kashan

This paper tries to study the relationship between social trust and social security (Personal, economic, political and societal) among citizens in Kashan. In 2012 through questionnaire move than 362 people at the age of 18  and higher were chosen to answer these questions. The results show that social trust affects on social security it means if we have name trust among people, we will observe...

متن کامل

ارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا

The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases,   the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...

متن کامل

The Role of Social Security in the Prevention of Social Deviances (A Case study among Girl high school students in Shoush)

This paper studies the role of social security in the prevention of social deviances. About 304 of high school girl students in Shoush (South west of Iran) were (systematic) randomly chosen. The research method was survey with questionnaire. The data were analyzed through spss along with Pearson coefficient correlation, Analysis of Variance, multivariable regression and path analysis were used ...

متن کامل

Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati

In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

متن کامل

The Role of Security in Social Deviations

The aim of this study is to investigate the role of security in social deviations among women of Babol city. Descriptive survey research method was used and the unit of analysis is 15-29 year old women that 284 women are selected on the basis of Cochran formula and using multi-stage random cluster sampling. The results show that there is a weak significant relationship between the independent v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009