Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Formalising Key-Distribution in the Presence of Trust using Object-Z

Long, B.

    Key distribution and trust management are two areas of interest in the world of internet security and are often merged to provide key distribution in the presence of trust relationships. We present two generic models using the Object-Z formalism, one for key distribution and another for trust management, and we show how the models can be combined via inheritance to produce concise models of key distribution in the presences of trust. We use Pretty Good Privacy as a specific example.
Cite as: Long, B. (2003). Formalising Key-Distribution in the Presence of Trust using Object-Z. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds. ACS. 59-66.
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS
 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 16 Nov 2007