期刊文献+

一种基于进程代数的安全协议验证消解算法 被引量:1

A Reduction Algorithm Based on Process Algebra for Security Protocol Verification
下载PDF
导出
摘要 安全协议本质上是分布式并发程序,可以描述为多个子进程的并发合成系统。将安全协议对应的并发合成系统抽象为一组逻辑规则,能够对安全协议无穷会话的交叠运行进行验证。本文首先给出了将安全协议基于进程代数的形式描述转化成为一组逻辑规则的方法,并提出了基于逻辑规则分类的高效逻辑程序消解算法,对安全协议认证性和保密性进行验证。 Essentially, security protocol can be considered as a set of distributed parallel programs, described as a parallel composition system including several sub-processes. We abstract this as a group of logic rules, which makes it possible to do the verification of the interleaving of infinite sessions of the security protocol. Our thesis proposes the approach to converting the process-algebra-described protocol to the horn logic rules , and proposes the high-efficiency algorithm of reduction.
出处 《计算机工程与科学》 CSCD 2006年第7期14-16,27,共4页 Computer Engineering & Science
基金 国家自然科学基金资助项目(90104026 60073001) 国家863计划资助项目(2002AA144040)
关键词 安全协议 进程代数 消解 保密性 认证性 security protocol process algebra reduce security authentication
  • 相关文献

参考文献5

  • 1G Lowe.Breaking and Fixing Then Needham-Schroeder Public-Key Protocol Using FDR[A].Proc of TACAS' 96[C].1996.147-166.
  • 2T Y G Woo,S S Lam.A Semantic Model for Authentication Protocols[A].Proc IEEE Symp on Security and Privacy[C].1993.178-194.
  • 3B Blanchet.An Efficient Cryptographic Protocol Verifier Based on Logic Programming Languages[A].Proc of the 14th Computer Security Foundation Workshop[C].2001.82-96.
  • 4J Gallagher,D A de Waal.Fast Precise Regular Approximations of Logic Programs[A].Proc of the 11th Int'l Conf on Logic Programming[C].1994.599-613.
  • 5Bruno Blanchet.From Secrecy to Authenticity in Security Protocols[A].9th Int'l Static Analysis Symp(SAS'02)[C].2002.242-259.

同被引文献21

  • 1乔海燕.安全协议验证的归纳方法与串空间形式化比较[J].计算机研究与发展,2008,45(z1):137-142. 被引量:1
  • 2吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 3Patrick Hner. Cloud Computing Security Requirements and Solutions: a Systematic Literature Review[C]. 19^th Twente Student Conference on IT, 2013.
  • 4R. La 'Quata Sumter. Cloud Computing: Security Risk Classification, ACMSE 2010, Oxford, USA.
  • 5何小虎.基于云计算的安全协议分析与设计[D].成都电子科技大学,2012.
  • 6王剑.移动终端可信接入与验证[D].同济大学,2011.
  • 7Grawrock D. TCG Specification Architecture Overview Revision 1.4.[EB/OL].[2011-05-01]. https://www. trustedcomputionggroup.org/groups/TCG 1.4 Archiecture Overview.pdf.
  • 8Shuching Wang, Wenpin Liao, Kuoqin Yan,et al. Security of cloud computing lightweight authentication protocol [J].Applied Mechanics and Materials, 2013, 284-287: 3502-3506.
  • 9R. Rajagopal, M. Chitra. Trust Based Interoperability Security Protocol for Grid and Cloud Computing[C].2012 3rd International Conference on Computing, Communication and Networking Technologies, 2012.
  • 10Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank Namdev, et al.Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment[C]. 2012 CSI 6th International Conference on Software Engineering, 2012.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部