Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

32 pages, 12 figures, 3 tables; journal submission; extended references, added discussion

Scientific paper

As computation spreads from computers to networks of computers, and migrates into cyberspace, it ceases to be globally programmable, but it remains programmable indirectly: network computations cannot be controlled, but they can be steered by local constraints on network nodes. The tasks of "programming" global behaviors through local constraints belong to the area of security. The "program particles" that assure that a system of local interactions leads towards some desired global goals are called security protocols. As computation spreads beyond cyberspace, into physical and social spaces, new security tasks and problems arise. As networks are extended by physical sensors and controllers, including the humans, and interlaced with social networks, the engineering concepts and techniques of computer security blend with the social processes of security. These new connectors for computational and social software require a new "discipline of programming" of global behaviors through local constraints. Since the new discipline seems to be emerging from a combination of established models of security protocols with older methods of procedural programming, we use the name procedures for these new connectors, that generalize protocols. In the present paper we propose actor-networks as a formal model of computation in heterogenous networks of computers, humans and their devices; and we introduce Procedure Derivation Logic (PDL) as a framework for reasoning about security in actor-networks. On the way, we survey the guiding ideas of Protocol Derivation Logic (also PDL) that evolved through our work in security in last 10 years. Both formalisms are geared towards graphic reasoning and tool support. We illustrate their workings by analysing a popular form of two-factor authentication, and a multi-channel device pairing procedure, devised for this occasion.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-224210

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.