期刊文献+

Model Checking Electronic CommerceSecurity Protocols Based on CTL 被引量:1

Model Checking Electronic CommerceSecurity Protocols Based on CTL
下载PDF
导出
摘要 We present a model based on Computational Temporal Logic (CTL) methods forverifying security requirements of electronic commerce, protocols. The model describes formally theauthentication, confidentiality integrity, non-repudiation) denial of serviee and access control ofthe e-lectronic commerce protocols. We illustrate as case study a variant of the Lu-Smolka protocolproposed by Lu-Smolka Moreover, we have discovered two attacks that allow a dishonest user topurchase a good debiting the amountto another user. And also, we compared our work with relativeresearch works and found lhat the formal way of this paper is more general to specify securityprotocols for E-Commerce. We present a model based on Computational Temporal Logic (CTL) methods forverifying security requirements of electronic commerce, protocols. The model describes formally theauthentication, confidentiality integrity, non-repudiation) denial of serviee and access control ofthe e-lectronic commerce protocols. We illustrate as case study a variant of the Lu-Smolka protocolproposed by Lu-Smolka Moreover, we have discovered two attacks that allow a dishonest user topurchase a good debiting the amountto another user. And also, we compared our work with relativeresearch works and found lhat the formal way of this paper is more general to specify securityprotocols for E-Commerce.
出处 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期333-337,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the Natural Science Foundation ofthe Department of Education of Guangdong Province (Z03001)
关键词 E-commercc security protocols formal methods computational temporal logic E-commercc security protocols formal methods computational temporal logic
  • 相关文献

参考文献2

二级参考文献3

共引文献14

同被引文献9

  • 1Sencun Z,Sanjeev S,Sushil J.LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. http://www.cse.psu.edu/~szhu/papers/ leap.pdf . 2006
  • 2Blaze M,Feigenbaum J,Lacy J.Decentralized Trust Man-agement[].Proc of the th Symp on Security and Privacy.1996
  • 3Blaze M,Feigenbaum J,Ioannidis J, et al.RFC2704—The KeyNote Trust Management System Version 2. http://www.ietf.org/rfc/rfc2704.txt . 2006
  • 4Ninghui L,John C M,William H W.Design of a Role-Based Trust Management Framework. http: //crypto.stanford.edu/~ninghui/papers/rt_oakland02.pdf . 2006
  • 5Sonja B,Jean-Yves L B.Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks. http://citeseer.ist.psu.edu/584132.html . 2004
  • 6Sonja B,Jean-Yves L B.A Robust Reputation System for P2P and Mobile Ad-hoc Networks. http://www.cs.cornell.edu/People/egs/cs615-spring07/rep-p2 pecon.pdf . 2004
  • 7Dellarocas C.Mechanisms for Coping with Unfair Ratings and Discriminatory Behavior in Online Reputation Reporting Systems. http://acm.lib.tsinghua. edu.cn . 2006
  • 8Audun J,Roslan I.The Beta Reputation System[]..2005
  • 9Paul R,Richard Z.Trust among Strangers in Internet Transac-tions: Empirical Analysis of eBay’s Reputation System. http://www.si.umich.edu/~presnick/papers/ebay NBER/RZNBERBodegaBay.pdf . 2006

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部