Conclusion
The Obol protocol programming language allows for testing and experimentation when constructing and using security protocols in real systems. It provides many other features useful to the protocol programmer than what's presented here (control structures, interactivity, and use as a crypto coprocessor). Obol is also used by the GridKit project (www.nw-grid.ac.uk/) at the University of Lancaster, UK to experiment with flexible security policies [7].
Acknowledgments
Thanks to Dr. Tage Stabell-Kulø at the University of Tromsø, Norway. Also, thanks to the GridKit project at the University of Lancaster, in particular Na Xu, Gordon Blair, and Paul Grace, for their investigations into integrating Obol into a reflective middleware platform.
References
- [1] Ross Anderson. "The Initial Costs and Maintenance Costs of Protocols," in 13th International Workshop on Security Protocols, 2005.
- [2] David Lorge Parnas. "Software Aging," in Proceedings of the 16th International Conference on Software Engineering, 1994.
- [3] Tage Stabell-Kulø and Simone Lupetti. "Publickey Cryptography and Availability," in Proceedings of the 24th Conference on Computer Safety, Reliability and Security, 2005.
- [4] Simone Lupetti, Feike W. Dillema, and Tage Stabell-Kulø. "Names in Cryptographic Protocols," in Proceedings of the 4th International Workshop on Security in Information Systems, 2006.
- [5] Michael Burrows, Martin Abadi, and Roger Needham. "A Logic of Authentication," ACM Transactions on Computer Systems, February 1990.
- [6] Butler Lampson, Martin Abadi, Michael Burrows, and Edward Wobber. "Authentication In Distribued Systems: Theory and Practice," ACM Transactions on Computer Systems, November 1992.
- [7] Na Xu, Gordon Blair, Per Harald Myrvang, Tage Stabell-Kulø, and Paul Grace. "The Role of Reflective Middleware In Supporting Flexible Security Policies," to appear in Proceedings of NODe, 2006. DDJ