23 research outputs found

    A Pessimistic Approach to Trust in Mobile Agent Platforms

    Get PDF
    To be provided later

    Extensions to an Authentication Technique Proposed for the Global Mobility Network

    Get PDF
    We present three attacks against the authentication protocol that has been proposed for the so called global mobility network in \cite{kn:Suz97}. We show that the attacks are feasible and propose corrections that make the protocol more robust and resistant against the presented attacks. Our aim is to highlight some basic design principles for cryptographic protocols, the adherence to which would have prevented these attacks

    Overall Integrity of Service Control in TINA Networks

    No full text
    This article is concerned with protecting service control against interruption attacks. It investigates threats to service control in the Telecommunications Information Networking Architecture. Traditional security services protect message flows, but not service logic. Attackers can still interrupt service control connections and take advantage of the caused influences on service control, even if the messages are cryptographically protected. The focus of this article is to prevent this kind of attack. A protocol for protecting overall integrity of service control by means of a cryptographic protocol is presented and its use is demonstrated

    CORBA as the Core of the TINA-DPE: A View from the Security Perspective

    No full text
    The article is concerned with security problems in the TINA architecture. It presents a structuring of this complex problem domain and proposes the architectural embedding of security services and mechanisms, mainly as part of the DPE. For this purpose, CORBA security is analyzed and its use in TINA is discussed. Keywords: TINA Security, CORBA Securit

    Cryptographic Protection of Connection Integrity with Interruption Detection in TINA

    No full text
    The Telecommunications Information Networking Architecture (TINA) provides the architectural basis for the realization of telecommunications services as distributed applications. In particular application of distributed systems, new security problems arise. We discuss threats that are caused by the interruption of service control connections. A method to detect interruptions is presented and the handling of interruptions is described. The detection method is based on a cryptographic protocol using sequence numbers and probe messages. TINA and its security approaches are introduced. The threats by interruption are illustrated using a toll fraud example. Keywords: TINA, Connection Integrity, Security States, Sequence Numbers, Probe Message

    Cryptographic Protection of Connection Integrity with Interruption Detection in TINA

    No full text
    The Telecommunications Information Networking Architecture (TINA) provides the architectural basis for the realization of telecommunications services as distributed applications. In particular application of distributed systems, new security problems arise. We discuss threats that are caused by the interruption of service control connections. A method to detect interruptions is presented and the handling of interruptions is described. The detection method is based on a cryptographic protocol using sequence numbers and probe messages. TINA and its security approaches are introduced. The threats by interruption are illustrated using a toll fraud example. Keywords TINA, Connection Integrity, Service Control Interruption, Security States, Sequence Numbers, Probe Messages 1 INTRODUCTION Computers are increasingly used for the control of telecommunications systems. The use of computers enables more flexibility in control as well as the fast and cheap introduction of new telecommunications..

    Workshop on Electronic Commerce (Welcom) Foreward

    No full text

    Security in TINA

    No full text
    TINA is a specification of an open architecture for telecommunication services in the broadband, multimedia, and information era. Its characteristics most relevant for security are a variety of services, a multitude of service providers, a well defined business model, a middleware platform for service development and provision, and the assumption of advanced costumer premises equipment. Concepts for its security architecture are developed in the CrySTINA project. We introduce the TINA-C architecture, analyse it with regard to security, and present the CrySTINA security architecture. CrySTINA is aligned with the OMG's CORBA Security specification, but enhances it with regard to security interoperability despite the heterogeneity of security policies and technologies that must be expected in TINA networks. Thus, we present a model for the enforcement of security policies that supports the negotiation of security contexts
    corecore