By Topic

IEEE Journal on Selected Areas in Communications

Issue 1 • Date Jan. 2003

Filter Results

Displaying Results 1 - 10 of 10
  • Guest editorial overview

    Publication Year: 2003, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (265 KB) | HTML iconHTML
    Freely Available from IEEE
  • Determining the operational limits of an anomaly-based intrusion detector

    Publication Year: 2003, Page(s):96 - 110
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Anomaly-detection techniques have considerable promise for two difficult and critical problems in information security and intrusion detection: detecting novel attacks, and detecting masqueraders. One of the best-known anomaly detectors used in intrusion detection is stide. (Rather than STIDE or Stide or s-tide, we have chosen "stide" in keeping with the way the detector was referred to in the pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time information flow analysis

    Publication Year: 2003, Page(s):20 - 35
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1120 KB) | HTML iconHTML

    In previous work, we studied some noninterference properties for information flow analysis in computer systems on classic (possibilistic) labeled transition systems. In this paper, some of these properties, notably bisimulation-based nondeducibility on compositions (BNDC), are reformulated in a real-time setting. This is done by first enhancing the security process algebra proposed by two of the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication by correspondence

    Publication Year: 2003, Page(s):88 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Correspondence properties capture authentication only indirectly. We trace the origin of correspondence in the analysis of authentication protocols and investigate to what extent correspondence actually corresponds to the various flavors of authentication. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced security protocol engineering through a unified multidimensional framework

    Publication Year: 2003, Page(s):62 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (985 KB) | HTML iconHTML

    Multidimensional security protocol engineering is effective for creating cryptographic protocols since it encompasses a variety of design, analysis, and deployment techniques, thereby providing a higher level of confidence than individual approaches offer. SPEAR II, the Security Protocol Engineering and Analysis Resource II, is a protocol engineering tool built on the foundation of previous experi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Language-based information-flow security

    Publication Year: 2003, Page(s):5 - 19
    Cited by:  Papers (376)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attacker's observations of system output; this policy regulates information flow. Conventional... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A nonfunctional approach to system integrity

    Publication Year: 2003, Page(s):36 - 43
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (587 KB) | HTML iconHTML

    Systems provide integrity protection by ensuring that there is no unauthorized modification of information. Traditional models of protection tend to define integrity in terms of ad hoc authorization techniques whose effectiveness is justified more on the basis of experience and "best practice," rather than on any common theoretical foundation. A formal definition of integrity is proposed that is i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifying the SET registration protocols

    Publication Year: 2003, Page(s):77 - 87
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (641 KB) | HTML iconHTML

    Secure electronic transaction (SET) is an immense e-commerce protocol designed to improve the security of credit card purchases. In this paper, we focus on the initial bootstrapping phases of SET, whose objective is the registration of cardholders and merchants with a SET certificate authority. The aim of registration is twofold: getting the approval of the cardholder's or merchant's bank and repl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal methods for cryptographic protocol analysis: emerging issues and trends

    Publication Year: 2003, Page(s):44 - 54
    Cited by:  Papers (51)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    The history of the application of formal methods to cryptographic protocol analysis spans over 20 years and has been showing signs of new maturity and consolidation. Not only have a number of specialized tools been developed, and general-purpose ones been adapted, but people have begun applying these tools to realistic protocols, in many cases supplying feedback to designers that can be used to im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Posets and protocols-picking the right three-party protocol

    Publication Year: 2003, Page(s):55 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    In this paper, we introduce a framework in which we can investigate the possibility of adapting a security protocol in order to obtain optimal efficiency according to the communication channels available. This method is based on the observation that there is a partial order imposed upon the actions of the various parties involved in a protocol. We define operations permitted on the partially order... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Journal on Selected Areas in Communications focuses on all telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Muriel Médard
MIT