Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation
نویسندگان
چکیده
This paper investigates interoperability problems arising from the use of dissimilar key recovery mechanisms in encrypted communications. The components that can cause interoperability problems are identified and a protocol is proposed where two communicating entities can negotiate the key recovery mechanism(s) to be used. The ultimate goal is to provide the entities a means to agree either on a mutually acceptable KRM or on different, yet interoperable, mechanisms of their
منابع مشابه
Title A negotiation protocol to support agent argumentation and ontology interoperability in MAS-based virtual enterprises
The virtual enterprise (VE), which is formed according to some business opportunities through the collaboration of supply chain partners, is an effective way of business operation in the dynamic global market. This paper proposes an automated negotiation protocol for multi-agent system (MAS) based virtual enterprises. Firstly, to facilitate the functional integration of VEs, a MAS framework is ...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملFramework for Ontology-Based Negotiation To Support Enterprise Interoperability in Cloud-Based Environments
In the actual competitive and global business context, the maintenance of interoperation among heterogeneous organisations in a collaborative environment becomes difficult to achieve. Hence, in a dynamic context a change in any of the networked partners affects the others, creating difficulties to sustain the interoperability of the networked environment. This paper proposes negotiation as a ke...
متن کاملSome observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication. On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001