期刊文献+

安全协议的形式化方法概述 被引量:2

Summarization on Security Protocols Formalization
下载PDF
导出
摘要 介绍了安全协议的形式化分析思路,阐述了安全协议形式化描述、需求、验证及设计四个方面的研究状况和它们的基本原理,并对常用的几种形式化验证技术的优缺点进行了分析,最后针对形式化技术在该领域的发展前景提出了自己的见解。 The paper introduces the history of analyzing security protocols formally and the thought of analyzing, describes the research and basic principles of security protocols formal description, requirements, verification and designing and also analyzes the advantages and disadvantages of several formal verification techniques .At last, some comments about the future of formal technology in this area are presented.
作者 刘霞 陈勇
出处 《计算机与数字工程》 2005年第5期39-43,共5页 Computer & Digital Engineering
关键词 安全协议 形式化 security protocol, formalization
  • 相关文献

参考文献12

  • 1J.Millen. CAPSL: Common Authentication Protocol Specification Language[R]. Technical Report MP 97B48, The MITRE Corporation, 1997.
  • 2M.Burrows, M.Abadi, and R.Needham. A logic of authentication[J]. ACM Transactions on Computer Systems, 1989,8(1):18~36.
  • 3Jonathan K Millen,Sidney C Clark,Sheryl B Freedam.The Interrogator:Protocol Security Analysis[J].TSE,1987,13(2):274~288.
  • 4Catherine Meadows. The NRL Protocol Analyzer: An overview[J]. Journal of Logic Programming,1996,26(2):113~131.
  • 5Gavin Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR[C]. In Proceedings of the TACAS, 1996,147~166.
  • 6D.L.Dill, A.J.Jrexler, A.J.Hu, and C.H.Yang. Protocol verification as a hardware design aid[C]. In IEEE International Conference in Computer Design: ALSI in Computers and Processors, 1992,522~525.
  • 7K.L.McMillan. Symbolic model checking: an approach to the state explosion problem[R]. Carnegie-Mellon University, Dapartment of Computer Science, Report CMU-CS-92-131. 1992.
  • 8L.C.Paulson. The inductive approach to verifying cryptographic protocols[J]. Journal of Computer Security,1998,6:85~128.
  • 9Fabrega F,Herzog J.Guttman J.Strand Spaces:Why is a security protocol correct?In Proceeding of the 1998 IEEE Symposium on Security and Privacy,1998.
  • 10Schneider S.Verifying authentication protocols in CSP[J].IEEE Transaction on Software Engineering,1998,24(9):741~758.

同被引文献6

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部