Risk analysis of host identity protocol: using risk Identification Method based on Value Chain Dynamics Toolkit

@inproceedings{Sskilahti2010RiskAO,
  title={Risk analysis of host identity protocol: using risk Identification Method based on Value Chain Dynamics Toolkit},
  author={Juha S{\"a}{\"a}skilahti and Mikko S{\"a}rel{\"a}},
  booktitle={ECSA Companion Volume},
  year={2010}
}
In this paper, we develop a Risk Identification Method based on Value Chain Dynamics Toolkit (VCDT) and apply it to a Risk Analysis of Host Identity Protocol (HIP) in a simple host-server scenario. The HIP Risk Analysis revealed no new risks inherent to the protocol itself. A number of potential risks in a typical deployment were identified. These risks should be analyzed and mitigated in the actual HIP deployment. The new Risk Identification method provided benefits, particularly in the… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.

Value Chain Dynamics Toolkit

  • Klym, Natalie, Trossen, Dirk
  • http://cfp.mit.edu/publications/CFP_WG_WS…
  • 2006
Highly Influential
21 Excerpts

Similar Papers

Loading similar papers…