The complexity and composability of secure interoperation
نویسندگان
چکیده
Advances in distributed systems and networking technology have made interoperation not only feasible but also increasingly popular. We deene the interop-eration of secure systems and its security, and prove complexity and composability results on obtaining optimal and secure interoperation. Most problems are NP-complete even for systems with very simple access control structures. Nevertheless, composability reduces complexity in that secure global interoperation can be obtained incrementally by composing secure local in-teroperation. We illustrate, through an application, how these theoretical results can help system designers in practice.
منابع مشابه
Computational Issues in Secure
| Advances in distributed systems and networking technology have made interoperation not only feasible but also increasingly popular. We deene the interoperation of secure systems and its security, and prove complexity and composability results on obtaining optimal and secure interoperation. Most problems are NP-complete even for systems with very simple access control structures, while for a g...
متن کاملApplying the Levels of Conceptual Interoperability Model in Support of Integratability, Interoperability, and Composability for System-of-Systems Engineering
The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. The model was successfully ap...
متن کاملSiMA: a discrete event system specification-based modelling and simulation framework to support model composability
In this paper we briefly present our views on composability of models and interoperation of simulations; we introduce our simulation software framework, namely Simulation Modelling Architecture (SiMA), and we present our contributions to the underlying formal model (i.e. discrete event system specification). We also present our simulation construction environment, which supports composability o...
متن کاملOn the Security of Protocols with Logarithmic Communication Complexity
We investigate the security of protocols with logarithmic communication complexity. We show that for the security definitions with environment, i.e., Reactive Simulatability and Universal Composability, computational security of logarithmic protocols implies statistical security. The same holds for advantage-based security definitions as commonly used for individual primitives. While this match...
متن کاملSimple, Black-Box Constructions of Adaptively Secure Protocols
We present a compiler for transforming an oblivious transfer (OT) protocol secure against an adaptive semi-honest adversary into one that is secure against an adaptive malicious adversary. Our compiler achieves security in the universal composability framework, assuming access to an ideal commitment functionality, and improves over previous work achieving the same security guarantee in two ways...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1994