期刊文献+

NetBill协议的形式化描述及分析 被引量:2

Formalization description and analysis of NetBill protocol
下载PDF
导出
摘要 通过对安全协议验证的形式化需求分析,论证了形式化描述和分析是描述电子商务协议并验证它们属性的有效方法.介绍了一个扩展的BAN逻辑,基于这个逻辑对一种电子交易协议NetBill协议进行形式化描述,并在有入侵的情况下对该协议所期望的属性(安全、原子、隐私)进行了正确的分析,证明了该协议在有入侵者的情况下能够满足安全、原子和隐私等要求.  With the requirement analysis of formalization verification for security protocols,it is confirmed that formalization description and analysis is an efficient way to describe electronic commerce protocol and verify their properties.An expanded BAN logic is introduced and,taking it as a basis,an electronic transaction protocol—NetBill protocol is formally described.The protocol is properly analyzed for its correctness of its desired attribution (security,atom,privacy) when there is an intruder.Thus,the protocol is proved to be meeting the requirement of security,atom,and,privacy under the condition of intrusion.
出处 《兰州理工大学学报》 CAS 北大核心 2004年第4期102-105,共4页 Journal of Lanzhou University of Technology
基金 国家科技攻关项目(2001BA201A32)
关键词 NetBill安全协议 电子商务 电子支付 属性 NetBill security protocol electronic commerce electronic payment attribution
  • 相关文献

参考文献9

  • 1Lu M A,Jeffrey J P.TSAI Formal verification Techniquesfor Computer Communication Security [EB/OL].http://cite seer.nj.nec.com/463674.html,2003-01-06/2003-05-12.
  • 2Burrows M,Abadi M,Needham R M.A logic of cryptographic [J].ACM Transaction on Computer Systems,1990,8 ( 1 ):18-36.
  • 3Nessett D M.A critique of the burrows,abadi,and needham logic [J].Operating Systems Review,1990,4(2):35-38.
  • 4Camp J,Harkavy M,Tygar J D,et al.Anonymous atomic transactions [EB/OL].http://citese er.nj.nec.com//116043.html,1996-07-03/2003-05-17.
  • 5Snekkenes E.Exploring the BAN approach to protocol analysis[A].Michael Ley.IEEE Symposium on Research in Security and Privacy [C].California:IEEE Computer Society Press,1991.74-78.
  • 6Cox B,Tygar J,Dsirbu M.NetBill Security and Transaction Protocol [EB/OL].http://citeseer.nj.nec.com/cox95netbill.html,2002-03-02/2003-05-07.
  • 7束妮娜,王亚弟.认证协议的形式逻辑分析方法——BAN类逻辑综述[J].计算机应用研究,2002,19(9):17-20. 被引量:2
  • 8左英男,戴英侠,许剑卓.一种安全的Internet小额交易协议分析[J].计算机工程,2000,26(7):136-138. 被引量:4
  • 9余冬梅,朱爱红,王海军.基于改进的BM算法在IDS中的实现[J].甘肃工业大学学报,2003,29(1):101-103. 被引量:7

二级参考文献12

  • 1殷人昆 陶永雷.数据结构 [M].北京:清华大学出版社,1999.361-363.
  • 2Douglas E C David L S.用TCP/IP进行网际互联:第3卷[M].北京:电子工业出版社,2001..
  • 3[1]Cox B, Tygar J D, Sirbu M. NetBill Security and Transaction Protocol. In Proceedings of the First USENIX Workshop on Electronic Commerce, 1995
  • 4[2]Cox B. Maintaining Privacy in Electronic Transactions.Information Networking Institute Technical Report TR 1994-8,Fall 1994
  • 5[3]Steiner J G, Neuman B C, Schiller J I. Kerberos: An Authentication Service for Open Network Systems. In USENIX Winter Conference, 1988-02:191
  • 6[4]ITU-T Recommendation X.509. The Directory: Authentication Framework. 1997-06
  • 7Michael Burrows,et al.A Logic of Cryptographic[].ACM Transactions on Computer Systems.1990
  • 8LiGong,et al.Reasoning About Belief in Authentication Protocols[].IEEE Computer Society Symposium in Security and Privacy.1990
  • 9MaoWen bo,et al.Towards the Formal Analysis of Security Protocols[].Proceedings of the Computer Security Foundation Workshop VI.1993
  • 10Abadi,etal.ASemanticsforaLogicofCryptographic (Exten dedAbstract)[].ProceedingsoftheTenthACMSympo siumonPrinciplesofDistributedComputing.1991

共引文献10

同被引文献15

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部