Towards a Framework for Autonomic Security Protocols

(Transcript of Discussion)
  • Simon N. Foley
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3364)


We’ve been looking at what we call the security protocol negotiation problem. People who use security protocols to authenticate, do key exchange, or whatever, are typically stuck with using whatever protocol is available. If the participants can’t agree on a suitable protocol, then they don’t get to use each other’s services. We are interested in self-configuring security protocols where the participants have to say what their requirements are and synthesise or con.gure their own suitable protocol that would meet their respective goals. If we have this idea of self-configuring security protocols then, as a consequence, we also have selfhealing security protocols. If the requirements change, or if the assumptions about our principals and keys change, then we have this ability to recon.gure and produce a security protocol that will meet those new goals, based on those assumptions.


Security Protocol Mutual Authentication Covert Channel Valid Protocol Suitable Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Simon N. Foley
    • 1
  1. 1.University CollegeCorkIreland

Personalised recommendations