期刊文献+

不可靠环境下多轮FR协议分析

Failure Analysis of Multiple Runs of FR Protocol Using Model Checking
下载PDF
导出
摘要 随着网络的大规模应用,越来越多的协议在并发的、不可靠的环境中执行。文章用有限自动机对FR协议建模,并用自动验证工具UPPAAL验证了多轮协议在可靠环境下的性质。重点验证了不可靠环境中多轮协议的执行情况,最后对协议进行了修改。 With the growing popularity of the lnternet,more and more protocols run concurrently.In this paper,finite state automata is used to model FR protocol.Then UPPAAL is used to verify some properties of the protocol when the site or communication is reliable.Thls paper focuses on multiple runs of FR protocol in the presence of site or comunication failure.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第33期142-145,共4页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(69873040) 河南省教育厅基础研究项目(2003520256)
关键词 电子商务协议 模型检测 不可靠环境 多轮执行 UPPAAL E-commerce protocol model checking failar analysis multiple runs UPPAAL
  • 相关文献

参考文献6

  • 1周典萃,卿斯汉,周展飞.一种分析电子商务协议的新工具[J].软件学报,2001,12(9):1318-1328. 被引量:47
  • 2王彩芬,葛建华.一种分析电子商务协议的新方法[J].计算机学报,2004,27(4):507-515. 被引量:10
  • 3GIAMPAOLO B,FABIO M,LAWRENCE C P.Verifying the SET registration protocols[J].IEEE Journal on Selected Areas in Communications,2003,21 (1):77-87.
  • 4GREGORIO D,FERNANDO C,VALENTIN V R,et al.Automatic verification of the TLS handshake protocol.Nicosia,Cyprus:SAC 2004:789-794.
  • 5LARSEM K G,PETTERSON P,WANG Yi.UPPAAL in a nutshell[J].Journal on Software Tools for Technology Transfer,1997,1 (1/2):134-152.
  • 6FRANKLIN M,REITER M.Fair exchange with a semi-trusted third party[C]//Proceedings of the 4th ACM conference on computer and communication security.Switzerland:ACM Press,1997:1-5.

二级参考文献10

  • 1Burrows M., Abadi M., Needham R.. A logic of authentication.ACM Transactions on Computer System,1999, 8(1): 18~36
  • 2Kailar R.. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering, 1996,2(5): 313~328
  • 3Feng Deng-Guo. Cryptanalysis. Beijing: Tsinghua University Publishing House, 2000(in Chinese)(冯登国著. 密码分析学. 北京:清华大学出版社, 2000)
  • 4Mauricio PAPA, Oliver Bremer, John HALE, Sujeet Shenoi. Formal analysis of E-commerce protocols. IEICS Transactions on Imformation & System, 2001,E84-D(10): 1313~1323
  • 5Zhou Jian-Ying, Gollmann Dieter. A fair non-repudiation protocol. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos,1996, 55~61
  • 6Bao Feng, Deng R.H., Mao Wen-Bo. Efficient and practical fair exchange protocols with off-line TTP. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, 1998, 77~85
  • 7Deng R.H., Gong L.. Practical protocols for certified electronic mail. Journal of Network and System Management,1996,4(3): 279~297
  • 8Zhou Jian-Ying, Gollmann Dieter. Towards verification of non-repudiation protocols. In: Proceedings of the 1998 International Refinement Workshop and Formal Methods Pacific, Canberra, Australia, 1998, 370~380
  • 9周典萃,卿斯汉,周展飞.Kailar逻辑的缺陷[J].软件学报,1999,10(12):1238-1245. 被引量:29
  • 10周典萃,卿斯汉,周展飞.一种分析电子商务协议的新工具[J].软件学报,2001,12(9):1318-1328. 被引量:47

共引文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部