Formal Methods for Web 2.0 Security Protocols - Position Paper


2. The network model is too detailed. The traditional model of the network as an opponent in cryptographic protocols enables the opponent to forge, alter and remove messages. In contrast, the basic protocols underlying, say, identity management frameworks assume integrity of messages. This greater abstraction permits the users and architects of Web 2.0… (More)


Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.

Slides referencing similar topics