Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hongbin Zhou is active.

Publication


Featured researches published by Hongbin Zhou.


international workshop on security | 2005

Authorisation subterfuge by delegation in decentralised networks

Simon N. Foley; Hongbin Zhou

This talk is about work by myself and Hongbin Zhou, who’s a PhD student in Cork (except he’s here today). One of the problems that we’re interested in is just simple authorisation, whether or not somebody is allowed to perform some action, get access to some resource. In the good old days we had the traditional view of system administrators who had control over everything, and they had, or at least liked to think that they had, a very clear picture of what the resources were for, and who should have access to the resources, and so on. As a consequence they tend to exercise very tight control, they don’t like giving away authorisation to resources, and it’s usually a battle for somebody to get additional access to any resource. Administrators in these closed systems exercise their principle of “no privilege”, nobody’s allowed to do anything. As a consequence, the opportunity to subvert an administrator is very small, so you really have to work hard to get anywhere within one of these closed systems.


formal methods in security engineering | 2003

Fast automatic synthesis of security protocols using backward search

Hongbin Zhou; Simon N. Foley

An automatic security protocol generator is proposed that used logic-based synthesis rules to guide it in a backward search for suitable protocols from protocol goals. The approach taken is unlike existing automatic protocol generators which typically carry out a forward search for candidate protocols from the protocol assumptions. A prototype generator has been built that performs well in the automatic generation of authentication and key exchange protocols.


ieee computer security foundations symposium | 2006

A framework for establishing decentralized secure coalitions

Hongbin Zhou; Simon N. Foley

A coalition provides a virtual space across a network that allows its members to interact in a transparent manner. Coalitions may be formed for a variety of purposes. These range from simple spaces used by individuals to share resources and exchange information, to highly structured environments in which businesses and applications operate and may be governed according to regulation and contract (security policy). Coalitions may spawn further coalitions and coalitions may come-together and/or merge. This paper describes a logic-based language that provides a foundation for coalition regulation and contract in a manner that avoids authorization subterfuge and has a number of novel features that make it applicable to open systems. The language provides inter- and intra-coalition delegation, including identity, role and threshold based delegation operations. The logic is used to describe a decentralized infrastructure for establishing and regulating these coalitions. Coalitions are formed with the involvement of founders, constructors and oversight. Constructors are responsible for properly creating a coalition; this service can be provided by a third party. If the service is improperly provided then the constructor is subject to a penalty, which may be collected by another third party providing oversight


Journal of Computer Security | 2012

Fast automatic security protocol generation

Hongbin Zhou; Simon N. Foley

An automatic security protocol generator is described that uses logic-based heuristic rules to guide it in a backward search for suitable protocols from protocol goals. The approach taken is unlike existing automatic protocol generators which typically carry out a forward search for candidate protocols from the protocol assumptions. A prototype generator has been built that performs well in the automatic generation of authentication and key exchange protocols. “In solving a problem of this sort, the grand thing is to be able to reason backward.” Sir Arthur Conan Doyle Sherlock Holmes A Study in Scarlet, 1887


new security paradigms workshop | 2004

A collaborative approach to autonomic security protocols

Hongbin Zhou; Simon N. Foley


Archive | 2006

Noninterference Analysis of Delegation Subterfuge

Simon Foley; Hongbin Zhou


FAST 2005 | 2006

A logic for analysing subterfuge in delegation chains

Hongbin Zhou; Simon N. Foley


Lecture Notes in Computer Science | 2005

Towards a framework for autonomic security protocols. Commentary. Authors' reply

Simon N. Foley; Hongbin Zhou; Matt Blaze; John Ioannidis; Alec Yasinsac; Ross J. Anderson; Pekka Nikander; Brian Monahan; Frank Stajano; Birgit Pfitzmann; Bruce Christianson; Mike Roe


international workshop on security | 2003

Towards a framework for autonomic security protocols

Simon N. Foley; Hongbin Zhou

Collaboration


Dive into the Hongbin Zhou's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alec Yasinsac

University of South Alabama

View shared research outputs
Top Co-Authors

Avatar

Matt Blaze

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Bruce Christianson

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge