期刊文献+

对几类重要网络安全协议形式模型的分析 被引量:23

Towards Analyzing Some Kinds of Critically Formal Models for Network Security Protocols
下载PDF
导出
摘要 该文根据建模基础的不同,对目前处在研究热点中的几个重要协议形式模型进行了分类分析.它们可以分为4类:基于知识演化系统的模型;基于规则推理系统的模型;基于代数演算系统的模型及基于计算复杂性理论的模型.对每类模型作者提出了相应的抽象特征体系,并在该体系下分析了有代表性的模型,指出了这些模型的优缺点及进一步改进的思路.抽象体系的提出不仅使模型的本质变得清晰,而且还使同类模型中的不同模型之间的联系变得易于理解;分析了不同类型模型之间可能存在的联系,特别是用基于规则推理的模型的思路改进了WooLam模型,在提出B模型抽象结构的同时,分析指出它极有可能发展成为一个统一各类模型的模型. In this paper, some kinds of critically formal models for security protocols, which have recently caught much researcher's attentions, are analyzed in terms of their different modeling bases. They are categorized as four classes: The knowledge evolution system based models, the logic proof system supporting deducibility by means of rules based models, the algebraic calculating system based models, and the computing complexity theory based models. Corresponding to every class of models, an abstract framework is proposed. Under these frameworks, the representative models in every class are analyzed, and especially their advantages and disadvantages and the ways to improve them are discussed. These frameworks make model key components more clear, and make relationships between different models easily understandable. Authors also analyze the possible connection between distinct classes of models. Especially, authors use the way stemming from the class of model based on logic proof supporting deducibility by means of rules to improve Woo-Lam model. The analysis shows that the B model is very possible to be developed to be a model to unify all other classes of models.
出处 《计算机学报》 EI CSCD 北大核心 2005年第7期1071-1083,共13页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目基金(G1999035802) 国家杰出青年基金(60025205 60273027)资助~~
关键词 安全协议 形式模型 抽象体系 安全性质 形式系统 Formal logic Information theory Knowledge based systems Network protocols Public key cryptography
  • 相关文献

参考文献22

  • 1Cervesato I., Durgin N.A., Lincoln P.D., Mitchell J.C., Scedrov A.. Relating strands and multiset rewriting for security protocol analysis. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, Cambridge, England, 2000, 35~52
  • 2Schneier B.. Applied Cryptography(2nd Edition). New York: John Wileysons, 1996
  • 3Rubin A.D.. Nonmonotonic cryptographic protocols[Ph.D. dissertation]. University of Michigan, Ann Arbor, 1994
  • 4Halpern J.Y., Fagin R.. Modelling knowledge and action in distributed systems. Distributed Computing,1989,3(4):159~179
  • 5Woo T.Y.C., Lam S.S.. A semantic model for authentication protocols. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 178~194
  • 6Marrero W., Clarke E., Jha S.. Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology, 2000, 9(4): 443~487
  • 7Stoller S.D.. A bound on attacks on payment protocols. In: Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science(LICS), Boston, Massachusetts, 2001, 61~70
  • 8Paulson L.. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998,6(1): 85~128
  • 9Hopper N.J., Seshia S.A., Wing J.M.. Combining theory generation and model checking for security protocol analysis. Technical Report: CMU-CS-00-107, 2000
  • 10Kindred D.. Theory generation for security protocols[Ph.D. dissertation]. Carnegie Mellon University, 1999

同被引文献139

引证文献23

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部