Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Using static analysis to validate the SAML single sign-on protocol
Hansen S., Skriver J., Nielson H.  Issues in the theory of security (Proceedings of the 2005 Workshop on Issues in the Theory of Security, Long Beach, California, Jan 10-11, 2005)27-40.2005.Type:Proceedings
Date Reviewed: May 5 2005

In this research paper, the authors study the Organization for the Advancement of Structured Information Standards (OASIS) Security Assertion Markup Language (SAML) single sign-on (SSO) protocol in the framework of the LySa process calculus, developed by the University of Pisa and the Technical University of Denmark (part of Design Environments for Global Applications (DEGAS)). The goal is to track all possible messages communicated on the network, and to record potential violations of the destination/origin annotations.

After a summary of the main features of the SSO protocol, the authors present a somewhat simplistic formalization of it, with no specific security measures for the message transfer. This is mainly to validate the approach, through the analysis of the reported violations. The documents describing the SSO protocol recommend the use of the transport layer security (TLS) protocol, however, so the authors develop a model of TLS in LySa and integrate it with SSO in various scenarios, focusing on the nature (unilateral or bilateral) of the TLS connections between the actors (user, source, and destination sites). The analyzer validates some of them, and challenges the others. The paper contributes a valuable method for tackling the formidable task of validating security protocols.

Reviewer:  F. Aribaud Review #: CR131228 (0603-0271)
Bookmark and Share
 
Protocol Verification (C.2.2 ... )
 
 
Authentication (K.6.5 ... )
 
 
Process Models (F.3.2 ... )
 
 
Standards (C.2.6 ... )
 
 
Internetworking (C.2.6 )
 
 
Semantics Of Programming Languages (F.3.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Protocol Verification": Date
Design and validation of computer protocols
Holzmann G. (ed), Prentice-Hall, Inc., Upper Saddle River, NJ, 1991. Type: Book (9780135399255)
Jul 1 1992
Improving round-trip time estimates in reliable transport protocols
Karn P., Partridge C. ACM Transactions on Computer Systems 9(4): 364-373, 1991. Type: Article
Aug 1 1992
Algebraic specification and verification of communication protocols
Koomen C. Science of Computer Programming 5(1): 1-36, 1985. Type: Article
Nov 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy