Foundations of provably secure browser-based protocols:
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Hochschulschrift/Dissertation Buch |
Sprache: | Englisch |
Veröffentlicht: |
Berlin [u.a.]
Europ. Univ.-Verl.
2009
|
Schriftenreihe: | IT-Security
9 |
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022461539&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XIV, 149 S. graph. Darst. 21 cm, 250 gr. |
ISBN: | 9783899663433 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV037307005 | ||
003 | DE-604 | ||
005 | 20120312 | ||
007 | t| | ||
008 | 110329s2009 xx d||| m||| 00||| eng d | ||
015 | |a 09,N39,0015 |2 dnb | ||
015 | |a 09,A43,0017 |2 dnb | ||
016 | 7 | |a 996578269 |2 DE-101 | |
020 | |a 9783899663433 |c kart. : EUR 24.90, sfr 24.90 (freier Pr.) |9 978-3-89966-343-3 | ||
024 | 3 | |a 9783899663433 | |
035 | |a (OCoLC)458694952 | ||
035 | |a (DE-599)DNB996578269 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a 510 |2 sdnb | ||
100 | 1 | |a Gajek, Sebastian |d 1980- |e Verfasser |0 (DE-588)139342079 |4 aut | |
245 | 1 | 0 | |a Foundations of provably secure browser-based protocols |c Sebastian Gajek |
264 | 1 | |a Berlin [u.a.] |b Europ. Univ.-Verl. |c 2009 | |
300 | |a XIV, 149 S. |b graph. Darst. |c 21 cm, 250 gr. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a IT-Security |v 9 | |
502 | |a Zugl.: Bochum, Univ., Diss., 2009 | ||
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Beweisbarkeit |0 (DE-588)7578966-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Browser |0 (DE-588)4423006-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Protokollverarbeitung |g Kommunikationstechnik |0 (DE-588)4845938-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Browser |0 (DE-588)4423006-0 |D s |
689 | 0 | 1 | |a Protokollverarbeitung |g Kommunikationstechnik |0 (DE-588)4845938-0 |D s |
689 | 0 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 3 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 5 | |a Beweisbarkeit |0 (DE-588)7578966-8 |D s |
689 | 0 | |5 DE-604 | |
830 | 0 | |a IT-Security |v 9 |w (DE-604)BV035420584 |9 9 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022461539&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-022461539 |
Datensatz im Suchindex
_version_ | 1819245243582644224 |
---|---|
adam_text | CONTENTS 1 INTRODUCTION 1 2 THE SECURITY MODEL AND DEFINITIONS 7 2.1 THE
MODEL: AN INTRODUCTION 7 2.1.1 THE ADVERSARY 8 2.1.2 RELATION TO
PREVIOUS SECURITY MODELS 13 2.2 NOTATIONS AND PRELIMINARIES 13 2.2.1
NOTATION 13 2.2.2 PRELIMINARIES 15 2.2.3 CRYPTOGRAPHIC ASSUMPTIONS 16
2.2.4 CRYPTOGRAPHIC BUILDING BLOCKS 17 2.3 A SIMULATION-BASED SECURITY
DEFINITION 21 2.3.1 REAL AND IDEAL WORLD 21 2.3.2 STANDARD AND RELAXED
NOTION OF UNIVERSAL COMPOSABIKTY SECURITY . . 22 2.3.3 UNIVERSAL
COMPOSITION IN GENERAL AND WITH JOINED STATE 24 2.4 BBUC FRAMEWORK: AN
OVERVIEW 25 2.4.1 IDEAL AND REAL BROWSER-BASED WORLD 26 2.4.2
LIMITATIONS OF THE BBUC FRAMEWORK 27 2.5 NETWORK LAYER 28 2.5.1
CONNECTION ESTABLISHMENT 28 2.5.2 DYNAMIC IDENTITY RESOLUTION 32 2.5.3
MODEL OF PROTOCOL EXECUTION 34 2.6 SECURITY LAYER 39 2.6.1 SECURE
COMMUNICATION SESSIONS 39 2.6.2 ON SESSION, SUB-SESSION AND PLAYER S IDS
41 2.7 MESSAGE LAYER 43 2.7.1 SCRIPTING FUNCTIONALITIES 43 2.8 MESSAGE
PROCESSING LAYER 48 2.8.1 SCRIPTING ACCESS CONTROL 48 2.8.2 MODEL OF
MESSAGE AGGREGATION 49 2.9 USER MODEL 50 2.9.1 PERCEPTION OF
AUTHENTICATORS 50 2.9.2 RELAXING THE IDEAL USER ASSUMPTION 53
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/996578269 DIGITALISIERT
DURCH 2.10 CORRUPTION MODEL: STATIC AND FUNCTIONAL 53 2.10.1 THE BROWSER
MAN-IN-THE-MIDDLE 56 CERTIFICATE-AUTHENTICATED SECURE SESSIONS PROTOCOLS
59 3.1 INTRODUCTION 59 3.1.1 RELATED WORK 60 3.1.2 ORGANIZATION 61 3.2
TRANSPORT LAYER SECURITY 61 3.2.1 TLS IN A NUTSHELL 61 3.2.2 ROADMAP FOR
THE MODULAR ANALYSIS OF TLS 63 3.3 SPECIFICATION AND ANALYSIS OF TLS
SUBROUTINES 64 3.3.1 UNIVERSAL KEY EXCHANGE FUNCTIONALITY 64 3.3.2
SUBROUTINE DHE 66 3.3.3 SUBROUTINE DHS 69 3.3.4 SUBROUTINE EKT 72 3.3.5
ON REALIZING MUTUAL AUTHENTICATION 75 3.4 IMPOSSIBILITY OF UC-SECURE TLS
HANDSHAKES 76 3.4.1 PROTOCOL TLS TAD DOES NOT UC-REALIZE ^ 2 76 3.4.2
PROTOCOL TLS * 1 DOES NOT RELAXED UC-REALIZE J^^ 2 78 3.5 TLS
UC-REALIZES SECURE COMMUNICATION SESSIONS 79 3.6 A MODIFIED TLS
PROTOCOL: SECURE SESSIONS WITH KEY EXTRACTION 84 LOCKED
COOKIE-AUTHENTICATED SECURE SESSIONS PROTOCOLS 91 4.1 INTRODUCTION 91
4.1.1 RELATED WORK 92 4.1.2 ORGANIZATION 93 4.2 COOKIE-AUTHENTICATED
SESSIONS AGAINST WEAK ADAPTIVE BROWSER ATTACKS ... 93 4.2.1 IDEAL
COOKIE-AUTHENTICATED SESSIONS FUNCTIONALITY 93 4.2.2 PROTOCOL CAS IN THE
.FGOP-HYBRID MODEL DOES NOT SECURELY REALIZE F CAS 95 4.2.3 PROTOCOL CAS
IN THE J^^OP-HYBRID MODEL SECURELY REALIZES T 6 NON-TRANSFERABLE
DELEGATED AUTHENTICATION SECURE SESSIONS PROTOCOLS 117 6.1 INTRODUCTION
117 6.1.1 RELATED WORK 119 6.1.2 ORGANIZATION 120 6.2 DELEGATED
AUTHENTICATION SECURE COMMUNICATION SESSIONS AGAINST STRONG ADAPTIVE
BROWSER ATTACKS 120 6.2.1 IDEAL DELEGATED AUTHENTICATION SECURE
COMMUNICATION SESSIONS . . . 120 6.2.2 PROTOCOL DAS 122 7 CONCLUSIONS
129 A CURRICULUM VITA 141
|
any_adam_object | 1 |
author | Gajek, Sebastian 1980- |
author_GND | (DE-588)139342079 |
author_facet | Gajek, Sebastian 1980- |
author_role | aut |
author_sort | Gajek, Sebastian 1980- |
author_variant | s g sg |
building | Verbundindex |
bvnumber | BV037307005 |
ctrlnum | (OCoLC)458694952 (DE-599)DNB996578269 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02276nam a2200553 cb4500</leader><controlfield tag="001">BV037307005</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120312 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">110329s2009 xx d||| m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N39,0015</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,A43,0017</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">996578269</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783899663433</subfield><subfield code="c">kart. : EUR 24.90, sfr 24.90 (freier Pr.)</subfield><subfield code="9">978-3-89966-343-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783899663433</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)458694952</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB996578269</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">510</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gajek, Sebastian</subfield><subfield code="d">1980-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)139342079</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Foundations of provably secure browser-based protocols</subfield><subfield code="c">Sebastian Gajek</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Europ. Univ.-Verl.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 149 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">21 cm, 250 gr.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IT-Security</subfield><subfield code="v">9</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Zugl.: Bochum, Univ., Diss., 2009</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Beweisbarkeit</subfield><subfield code="0">(DE-588)7578966-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Browser</subfield><subfield code="0">(DE-588)4423006-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Protokollverarbeitung</subfield><subfield code="g">Kommunikationstechnik</subfield><subfield code="0">(DE-588)4845938-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Browser</subfield><subfield code="0">(DE-588)4423006-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Protokollverarbeitung</subfield><subfield code="g">Kommunikationstechnik</subfield><subfield code="0">(DE-588)4845938-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Beweisbarkeit</subfield><subfield code="0">(DE-588)7578966-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IT-Security</subfield><subfield code="v">9</subfield><subfield code="w">(DE-604)BV035420584</subfield><subfield code="9">9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022461539&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-022461539</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV037307005 |
illustrated | Illustrated |
indexdate | 2024-12-20T15:14:10Z |
institution | BVB |
isbn | 9783899663433 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-022461539 |
oclc_num | 458694952 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | XIV, 149 S. graph. Darst. 21 cm, 250 gr. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Europ. Univ.-Verl. |
record_format | marc |
series | IT-Security |
series2 | IT-Security |
spellingShingle | Gajek, Sebastian 1980- Foundations of provably secure browser-based protocols IT-Security Kryptoanalyse (DE-588)4830502-9 gnd Beweisbarkeit (DE-588)7578966-8 gnd Browser (DE-588)4423006-0 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Protokollverarbeitung Kommunikationstechnik (DE-588)4845938-0 gnd Authentifikation (DE-588)4330656-1 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)7578966-8 (DE-588)4423006-0 (DE-588)4709127-7 (DE-588)4845938-0 (DE-588)4330656-1 (DE-588)4113937-9 |
title | Foundations of provably secure browser-based protocols |
title_auth | Foundations of provably secure browser-based protocols |
title_exact_search | Foundations of provably secure browser-based protocols |
title_full | Foundations of provably secure browser-based protocols Sebastian Gajek |
title_fullStr | Foundations of provably secure browser-based protocols Sebastian Gajek |
title_full_unstemmed | Foundations of provably secure browser-based protocols Sebastian Gajek |
title_short | Foundations of provably secure browser-based protocols |
title_sort | foundations of provably secure browser based protocols |
topic | Kryptoanalyse (DE-588)4830502-9 gnd Beweisbarkeit (DE-588)7578966-8 gnd Browser (DE-588)4423006-0 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Protokollverarbeitung Kommunikationstechnik (DE-588)4845938-0 gnd Authentifikation (DE-588)4330656-1 gnd |
topic_facet | Kryptoanalyse Beweisbarkeit Browser Sicherheitsprotokoll Protokollverarbeitung Kommunikationstechnik Authentifikation Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022461539&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV035420584 |
work_keys_str_mv | AT gajeksebastian foundationsofprovablysecurebrowserbasedprotocols |