SG logic — a formal analysis technique for authentication protocols

Author(s):  
Sigrid Gürgens

Author(s):  
Susana Fernández-Lores ◽  
Gema Martínez-Navarro ◽  
Diana Gavilán

The evolution of technology and the digital empowerment of society have led to the proliferation of Audiovisual Content Webs (ACWs) where users can share information and experiences, along with other commercial resources. ACWs have led to significant changes in the way users can select and access audiovisual content. The design of these websites combines various features, including a user community, streamed content, ticket sales, and recommendations, among others. Each ACW has a specific profile with respect to the mentioned variables. The aim of this study is to identify the critical success factors for a ACW, i.e., which features and the form they should take to attract followers, thus increasing the capacity to prescribe and broadcast content. Using qualitative comparative analysis (QCA), a formal analysis technique that allows the identification of combinations that produce a certain result, a sample of the 12 most representative cinema websites in Spain is analyzed. The results indicate that the incorporation of content recommendation systems and the connection with streaming platforms through which the content can be accessed are key factors in the success of these ACWs. This work contributes academically to the knowledge and explanation of audience behavior in the new audiovisual scenario. From a professional point of view, relevant design suggestions are offered to platform creators. Finally, the limitations of this work are described, and future lines of research are considered. Resumen La evolución de la tecnología y el empoderamiento digital de la sociedad ha dado lugar a la proliferación de webs de contenidos audiovisuales (WCA) donde los usuarios comparten información y experiencias, junto a otros recursos comerciales. Las WCA han provocado cambios significativos en la forma en la que los usuarios pueden seleccionar y acceder a los contenidos audiovisuales. En su diseño, estas webs combinan varias prestaciones: comunidad de usuarios, contenidos en streaming, venta de entradas o recomendaciones, entre otros. Cada WCA presenta un perfil específico respecto a las variables descritas. El objetivo del presente trabajo es identificar los factores críticos de éxito de una WCA, es decir las prestaciones y la forma que deben adoptar para captar seguidores, aumentando con ello capacidad de prescripción y difusión de contenidos. Mediante el análisis cualitativo comparado (QCA), técnica formal de análisis que permite la identificación de combinaciones que producen un determinado resultado, se analiza una muestra de las 12 webs de cine más representativas en España. Los resultados indican que la incorporación de sistemas de recomendación de contenidos y la conexión con plataformas en streaming desde las que poder acceder a los contenidos son factores claves del éxito. El trabajo contribuye académicamente al conocimiento y la explicación de la conducta de la audiencia en el nuevo escenario audiovisual. Desde el punto de vista profesional se ofrecen sugerencias relevantes de diseño para los creadores de plataformas. Por último, se describen las limitaciones del trabajo y se plantean futuras líneas de investigación.



1991 ◽  
Vol 3 (2) ◽  
pp. 81-98 ◽  
Author(s):  
Klaus Gaarder ◽  
Einar Snekkenes




Author(s):  
Ammar Boucherit ◽  
Laura M. Castro ◽  
Osman Hasan ◽  
Abdallah Khababa


Author(s):  
Laura M. Castro ◽  
Osman Hasan ◽  
Ammar Boucherit ◽  
Abdallah Khababa


2021 ◽  
Vol 24 (2) ◽  
pp. 1-34
Author(s):  
Charlie Jacomme ◽  
Steve Kremer

Passwords are still the most widespread means for authenticating users, even though they have been shown to create huge security problems. This motivated the use of additional authentication mechanisms in so-called multi-factor authentication protocols. In this article, we define a detailed threat model for this kind of protocol: While in classical protocol analysis attackers control the communication network, we take into account that many communications are performed over TLS channels, that computers may be infected by different kinds of malware, that attackers could perform phishing, and that humans may omit some actions. We formalize this model in the applied pi calculus and perform an extensive analysis and comparison of several widely used protocols—variants of Google 2-step and FIDO’s U2F (Yubico’s Security Key token). The analysis is completely automated, generating systematically all combinations of threat scenarios for each of the protocols and using the P ROVERIF tool for automated protocol analysis. To validate our model and attacks, we demonstrate their feasibility in practice, even though our experiments are run in a laboratory environment. Our analysis highlights weaknesses and strengths of the different protocols. It allows us to suggest several small modifications of the existing protocols that are easy to implement, as well as an extension of Google 2-step that improves security in several threat scenarios.



Author(s):  
Siraj Ahmed Shaikh

The purpose of this chapter is to introduce the reader to the research area of formal analysis of authentication protocols. It briefly introduces the basic notions of cryptography and its use in authentication protocols. The chapter looks at the Needham-Schroeder (1978) protocol as an example of an authentication protocol, and examines the history of the protocol as a stimulus to the formal analysis of such protocols. We then introduce the process algebra CSP (Hoare, 1985) to model authentication protocols and present Schneider’s (1998) rank function approach to analysing such protocols. The chapter concludes by describing related ongoing work in this area of research and highlight some of the challenges posed by the problem of analysing and designing protocols.



Sign in / Sign up

Export Citation Format

Share Document