期刊文献+

一个电子投递协议的改进

Improvement of an Electronic Submission Protocol
下载PDF
导出
摘要 电子商务协议需要满足一定的安全特性,其中一个特性是时限性。时限性是指协议中各个主体的行为必须在规定的时间范围内完成,而对于违反了时限要求的主体行为,这类协议都应能够追究该主体的时限责任。该文分析了Kudo提出的一个安全电子投递协议中的两个缺陷,并给出了改进后协议的时限责任证明。 Electronic commerce protocol must satisfy some security properties.One of the properties for time-critical secure protocols is temporal accountability.This property requires all principals in the protocol to finish their tasks within a specified period and the protocol has the ability to figure out each individual's temporal accountability.Two flaws in an electronic submission protocol proposed by Kudo have been pointed out and corrected in this paper.At the end of this paper,a formal analysis of the improved protocol is also shown.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第29期195-198,共4页 Computer Engineering and Applications
基金 广西自然科学基金项目(编号:0229051)资助
关键词 电子投递协议 时限性 时限责任 electronic submission protocol,temporal property,temporal accountability
  • 相关文献

参考文献6

  • 1梁坚,敖青云,尤晋元.安全协议的时限责任分析[J].电子学报,2002,30(10):1450-1454. 被引量:6
  • 2Kudo M.Electronic submission protocol based on temporal accountability[C].In :Proc of the 14th Annual Computer Security Application Conf, Phoenix: ACSA, 1998: 353 ~363
  • 3Kailar R.Accountability in electronic commerce protocols[J].IEEE Trans on Software Engineering,1996;22(5):313~328
  • 4Syverson P.Adding time to a logic of authentication[C].In:Proc of the 1st ACM Conf on Computer and Communications Security,Fair-fax:ACM, 1993:97~101
  • 5Burrows M,Abadi M,Needham R M.A logic of authentication[R].Report 39 Palo Alto,CA:DEC System Research Center,1989
  • 6Abadi M,Tuttle M R.A semantics for a logic of authentication[C].In:Proc of the 10th Annual ACM Symposium on Principles of Distributed Computing, 1991:201~216

二级参考文献10

  • 1Subramanian S.Design and verification of secure e-commerce protocols[D].USA:The Ohio State University,1998.
  • 2Denning D E,Sacco G M.Timestamps in key distribution protocols[J].Comm.of ACM,1981,24(8):533-536.
  • 3Syverson P.Adding time to a logic of authentication[A].In Proc.of the 1st ACM Conf.on Computer and Communications Security[C].Fairfax:ACM,1993.97-101.
  • 4Abadi M,Tuttle M R.A semantics for a logic of authentication[A].Proc.of the 10th Annual ACM Symposium on Principles of Distributed Computing[C].1991.201-216.
  • 5Stubblebine S G,Wright R N.An authentication logic supporting synchronization,revocation,and recency[A].Proc.of the 3rd ACM Conf.on Computer and Communications Security[C].New Delhi:ACM,1996.95-105.
  • 6Kailar R.Accountability in electronic commerce protocols[J].IEEE Trans.on Software Engineering,1996,22(5):313-328.
  • 7Kudo M.Electronic submission protocol based on temporal accountability[A].Proc.of 14th Annual Computer Security Application Conf.[C].Phoenix:ACSA,1998.353-363.
  • 8Sirbu M,Tygar J D.NetBill:an internet commerce system optimized for network delivered services[J].IEEE Personal Communications,1995,2(4):34-39.
  • 9Yee B,Tygar J D.Secure coprocessors in electronic commerce applications[A].Proc.of the 1st USENIX Workshop on Electronic Commerce[C].New York:USENIX,1995.155-170.
  • 10Burrows M,Abadi M,Needham R M.A logic of authentication.Report.39[R].Palo Alto,CA:DEC System Research Center,1989.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部