Sciweavers

Share
ISCC
2007
IEEE

Gaining Flexibility by Security Protocol Transfer

9 years 10 months ago
Gaining Flexibility by Security Protocol Transfer
Even though PDAs in general—but smartcards in particular—can be trusted to keep secrets, because they have meager resources, including them in security protocols is difficult. The PDAs—and again smartcards in particular—ends up as a mere key-store and their processing power is not used. We describe a mechanism that allows such anemic computers to fully participate in protocols, even if the protocol in question by far exceeds their capabilities. This is done by means of machinery for transferring, at runtime, the protocol proper to a more powerful machine. We describe the mechanisms that makes this possible (mainly a domain specific programming language named Obol [5] and its implementation) and we discuss the credentials and certificates needed for the solution to maintain correctness.
Per Harald Myrvang, Tage Stabell-Kulø
Added 04 Jun 2010
Updated 04 Jun 2010
Type Conference
Year 2007
Where ISCC
Authors Per Harald Myrvang, Tage Stabell-Kulø
Comments (0)
books