期刊文献+

基于串空间模型的电子商务协议的形式化分析 被引量:1

Formal Analysis to E-commerce Protocol Based on Strand Space
下载PDF
导出
摘要 采用形式化方法分析安全协议是协议分析的有效手段,近年来,出现了众多的研究方法。串空间模型是一种新兴的密码协议形式化分析工具。文章基于串空间模型,扩展了认证测试方法,使之能够描述和分析电子商务协议。并用该方法对一个具体的协议进行了形式化分析,得到了与以往文献相同的结论。 Using formal method to analyze security protocol is a valid method to the analysis of security protocols.In recent years,a lot of formal methods appeared.Strand space model is a new formal analysis tool to the analysis of cryptogram protocol.Based on strand space,we extend the authentication tests method.Using this method,E-commerce protocol can be described and analyzed.We apply it to the analysis of ASW protocol and find all attacks appeared in former literatures.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第3期123-126,145,共5页 Computer Engineering and Applications
关键词 串空间模型 认证测试 形式化分析 交换协议 电子商务协议 strand space, authentication tests, formal analysis, exchange protocol
  • 相关文献

参考文献8

  • 1Steve KREMER.Formal Analysis of Optimistic Fair Exchange Protocols[D].PhD thesis.Universit'e Libre de Bruxelles Facult'e des Sciences, 2003-2004.
  • 2Steve A Schneider.Formal analysis of a non-repudiation protocol[C]. In : 11th IEEE Computer Security Foundations Workshop,Washington- Brussels-Tokyo, IEEE, 1998-06: 54-65.
  • 3Giampaolo Bella,Lawrence C Paulson.Meehanical proofs about a nonrepudiation protocol[C].In:Richard J Boulton,Paul B Jackson eds.Theorem Proving in Higher Order Logics,volume 2152 of Lecture Notes in Computer Scienee,Springer-Vedag,2001:91-104.
  • 4Thayer FJ,Herzog JC,Guttman JD.Strand spaces:Proving security protocols correct[J].Joumal of Computer Security, 1999;7(2-3) : 191-230.
  • 5Guttman JD,Thayer FJ.Authentication tests[C].In :Proceedings of the 2000 IEEE Symposium on Security and Privacy,Los Alamitos:IEEE Computer Society Press,2000 : 150-164.
  • 6卿斯汉.电子商务协议中的可信第三方角色[J].软件学报,2003,14(11):1936-1943. 被引量:31
  • 7Asokan N,Shoup V,Waidner M.Asynchronous Protocols for optimistic fair exchange[C].In :Proceeding of the 1998 IEEE Symposium on Security and Privacy ,Los Alamitons:IEEE Computer Society Press, 1998 : 86-99.
  • 8Jianying Zhou,Robert H Deng,Feng Bao.Some remarks on a fair exchange protocol[C].In :International workshop on practice and Theory in public Key Cryptography,volume 1751 of Lecture Notes in Computer Science,Springer Vedag,2000-01:46-57.

二级参考文献13

  • 1卿斯汉.安全协议的设计与逻辑分析.软件学报,2003,14(7):1300~1309.http://www.jos.org.cn/1000-9825/14/1300.htm.,.
  • 2卿斯汉.安全协议20年研究进展.软件学报, 2003,14(10):1740~1752.http://www.jos.org.cn/1000-9825/14/1740.htm.,.
  • 3ISO/IEC 3rd CD 13888-1. Information technology-Security techniques Part 1: General model. ISO/IEC JTC11/SC24 N1274, 1996.
  • 4Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transactions on Computer Systems, 1990,8(1):18-36.
  • 5Kailar R. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering, 1996,22(5):313-328.
  • 6Coffey T, Saidha P. Non-Repudiation with mandatory proof of receipt. Computer Communication Review, 1996,26(1):6- 17.
  • 7Deng RH, Gong L, Lazar AA, Wang W. Practical protocols for certified electronic mail. Journal of Network and Systems Management, 1996,4(3):279-297.
  • 8Asokan N, Shoup V, Waidner M. Asynchronous protocols for optimistic fair exchange. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998. 86-99.
  • 9卿斯汉.安全协议20年研究进展.软件学报,2003,14(10):1740-1752[EB/OL].http://www.jos.org.cn/1000-9825/14/1740.htm.,.
  • 10卿斯汉.安全协议的设计与逻辑分析.软件学报,2003,14(7):1300-1309[EB/OL].http://www.jos.org.cn/1000-9825/14/1300.htm.,.

共引文献30

同被引文献2

引证文献1

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部