MIME-Version: 1.0
Server: CERN/3.0
Date: Tuesday, 07-Jan-97 15:55:05 GMT
Content-Type: text/html
Content-Length: 4987
Last-Modified: Friday, 01-Mar-96 21:21:33 GMT


<title> Network Security</title>
<H1> Network Security</H1>

<hr>

To enhance the security of networked systems, we proposed a security 
architecture together with novel protocols for authentication, 
called Texas Authentication Protocols (TAPs), and a new language 
for authorization, called Generalized Access Control List (GACL).  
A proof methodology for verifying authentication protocols based upon
state transition semantics has been developed.  A high level abstraction
for secure network programming (SNP), designed to resemble a socket interface,
has been implemented.

<hr>

<H1> Recent papers </H1>

        <ol>
        <li> <b> SNP : An interface for secure network programming</b>
        <br>
        Thomas Y.C. Woo, Raghuram Bindignavle, Shaowen Su and Simon S. Lam
        <br>
        <cite> Proc. USENIX '94 Summer Technical Conference, </cite>
               Boston, June 1994
                <ul>
                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/usenix2.ps.Z">
                <b>compressed postscript file</b></a>
                </ul>

        <li> <b> Design, verification and implementation of an authentication
                 protocol </b>
        <br>
        Thomas Y.C. Woo and Simon S. Lam
        <br>
        <cite> Proc. Int. Conference on Network Protocols, </cite>
               Boston, October 1994
                <ul>
                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/icnp94.ps.Z">
                <b>compressed postscript file</b></a>
                </ul>

        <li> <b> Authorization in distributed systems: A new approach</b>
        <br>
        Thomas Y.C. Woo and Simon S. Lam
        <br>
		<cite> Journal of Computer Security, </cite> 1994
                <ul>
                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/final-1.ps.Z">
                <b>compressed postscript file</b></a>
                </ul>

        <li> <b> A lesson in authentication protocol design</b>
        <br>
        Thomas Y.C. Woo and Simon S. Lam
        <br>
        <cite> ACM Operating Systems Review, </cite> vol. 28, no. 3, 1994
                <ul>
                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/osr.ps.Z">
                <b>compressed postscript file</b></a>
                </ul>

        <li> <b> A framework for distributed authorization </b>
        <br>
        Thomas Y.C. Woo and Simon S. Lam
        <br>
        <cite> Proc. ACM Conference on Computer and Communications Security, </cite>
               Fairfax, Virginia, November 1993
                <ul>
                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/acm-es.ps.Z">
                <b>compressed postscript file</b></a>
                </ul>

        <li> <b> Verifying authentication protocols: Methodology and example</b>
        <br>
	Thomas Y. C. Woo and Simon S. Lam
	<br>
	<cite> Proc. Int. Conference on Network Protocols,</cite>
	       San Francisco, October 1993
                <ul>
                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/icnp.ps.Z">
                <b>compressed postscript file</b></a>
                </ul>
 
	<li> <b>A semantic model for authentication protocols</b>
	<br>
	Thomas Y. C. Woo and Simon S. Lam
	<br>
	<cite> Proc. IEEE Symposium on Research in Security and Privacy,</cite>
	       Oakland, May 1993
                <ul>
                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/sec93.ps.Z">
                <b>compressed postscript file</b></a>
                </ul>

        <li> <b> Authorization in distributed systems: A formal approach</b>
        <br>
        Thomas Y.C. Woo and Simon S. Lam
	<br>
        <cite> Proc. IEEE Symposium on Research in Security and Privacy, </cite> 
       	       Oakland, May 1992
                <ul>
                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/sec92.ps.Z">
                <b>compressed postscript file</b></a>
                </ul>

        <li> <b> Applying a theory of modules and interfaces to security verification</b>
        <br>
        Simon S. Lam, A. Udaya Shankar, and Thomas Y. C. Woo
	<br>
        <cite> Proc. IEEE Symposium on Research in Security and Privacy, </cite> 
	       Oakland, May 1991
                <ul>
                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/main.ps.Z">
                <b>compressed postscript file</b></a>
                </ul>

        <li> <b> Authentication revisited</b>
        <br>
        Thomas Y.C. Woo and Simon S. Lam
        <br>
        <cite> Computer, </cite> vol. 25, no. 3, page 10, March 1992
	<br>
	(first publication of authentication protocol implemented in SNP)
<p>

        <li> <b> Authentication for distributed systems </b>
        <br>
        Thomas Y.C. Woo and Simon S. Lam
        <br>
        <cite> Computer, </cite> vol. 25, no. 1, pp. 39-52, January 1992
                <ul>
                <li> <a href = "comp1.html">
                <b>more info</b></a>
                </ul>
        </ol>



