Hongbin Zhou
University College Cork
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hongbin Zhou.
international workshop on security | 2005
Simon N. Foley; Hongbin Zhou
This talk is about work by myself and Hongbin Zhou, who’s a PhD student in Cork (except he’s here today). One of the problems that we’re interested in is just simple authorisation, whether or not somebody is allowed to perform some action, get access to some resource. In the good old days we had the traditional view of system administrators who had control over everything, and they had, or at least liked to think that they had, a very clear picture of what the resources were for, and who should have access to the resources, and so on. As a consequence they tend to exercise very tight control, they don’t like giving away authorisation to resources, and it’s usually a battle for somebody to get additional access to any resource. Administrators in these closed systems exercise their principle of “no privilege”, nobody’s allowed to do anything. As a consequence, the opportunity to subvert an administrator is very small, so you really have to work hard to get anywhere within one of these closed systems.
formal methods in security engineering | 2003
Hongbin Zhou; Simon N. Foley
An automatic security protocol generator is proposed that used logic-based synthesis rules to guide it in a backward search for suitable protocols from protocol goals. The approach taken is unlike existing automatic protocol generators which typically carry out a forward search for candidate protocols from the protocol assumptions. A prototype generator has been built that performs well in the automatic generation of authentication and key exchange protocols.
ieee computer security foundations symposium | 2006
Hongbin Zhou; Simon N. Foley
A coalition provides a virtual space across a network that allows its members to interact in a transparent manner. Coalitions may be formed for a variety of purposes. These range from simple spaces used by individuals to share resources and exchange information, to highly structured environments in which businesses and applications operate and may be governed according to regulation and contract (security policy). Coalitions may spawn further coalitions and coalitions may come-together and/or merge. This paper describes a logic-based language that provides a foundation for coalition regulation and contract in a manner that avoids authorization subterfuge and has a number of novel features that make it applicable to open systems. The language provides inter- and intra-coalition delegation, including identity, role and threshold based delegation operations. The logic is used to describe a decentralized infrastructure for establishing and regulating these coalitions. Coalitions are formed with the involvement of founders, constructors and oversight. Constructors are responsible for properly creating a coalition; this service can be provided by a third party. If the service is improperly provided then the constructor is subject to a penalty, which may be collected by another third party providing oversight
Journal of Computer Security | 2012
Hongbin Zhou; Simon N. Foley
An automatic security protocol generator is described that uses logic-based heuristic rules to guide it in a backward search for suitable protocols from protocol goals. The approach taken is unlike existing automatic protocol generators which typically carry out a forward search for candidate protocols from the protocol assumptions. A prototype generator has been built that performs well in the automatic generation of authentication and key exchange protocols. “In solving a problem of this sort, the grand thing is to be able to reason backward.” Sir Arthur Conan Doyle Sherlock Holmes A Study in Scarlet, 1887
new security paradigms workshop | 2004
Hongbin Zhou; Simon N. Foley
Archive | 2006
Simon Foley; Hongbin Zhou
FAST 2005 | 2006
Hongbin Zhou; Simon N. Foley
Lecture Notes in Computer Science | 2005
Simon N. Foley; Hongbin Zhou; Matt Blaze; John Ioannidis; Alec Yasinsac; Ross J. Anderson; Pekka Nikander; Brian Monahan; Frank Stajano; Birgit Pfitzmann; Bruce Christianson; Mike Roe
international workshop on security | 2003
Simon N. Foley; Hongbin Zhou