期刊文献+

PMI中属性权威与属性注册权威通信模型设计及形式化描述

Communication model of attribute authority and attribute registration authority in PMI and its formal description
下载PDF
导出
摘要 授权管理基础设施(PMI)系统中属性权威(AA)与属性注册权威(ARA)通信状态多且变化复杂。提出了一个PMI中AA与ARA的通信模型,以避免不安全的中间状态出现。对该模型的特征进行了分析,运用有限状态机(FSM)对该模型进行形式化描述,并证明了其安全性。 There are many states in attribute authority (A-A) and attribute registration authority (ARA) communication, and its transformation is complicated. An AA and ARA communication model in privilege management infrastructure (PMI) was proposed, which could avoid insecure middle states. The finite state machine was used to formalize the proposed model, and to prove the secure state of the model.
出处 《计算机应用》 CSCD 北大核心 2007年第7期1597-1598,1602,共3页 journal of Computer Applications
基金 国家863计划项目(2006AA01Z457)
关键词 授权管理基础设施 属性权威 属性注册权威 有限状态机 Privilege Management Infrastructure (PMI) Attribute Authority (A_A) Attribute Registration Authority (ARA) Finite State Machine (FSM)
  • 相关文献

参考文献5

二级参考文献16

  • 1孙治国,成晓明,裘智峰.PLC与单片机串行通信的应用[J].计算技术与自动化,2003(z1):185-186. 被引量:4
  • 2甘永成.小型水库土坝安全自动监测系统软件[J].计算技术与自动化,2005,24(1):65-67. 被引量:1
  • 3王锁萍.电子设计自动化(EDA)教程[M].成都:电子科技大学出版社,2002..
  • 4华庆一 王斌君等译.面向对象系统的测试[M].北京:人民邮电出版社,2001..
  • 5HIERONS RM, KIM TH, URAL H. Expanding an Extended Finite State Machine to aid Testability[ A]. Proceedings of the 26th Annual International Computer Software and Applications Conference(COMPSAC'02) [ C]. IEEE Computer Society Press, 2002. 1 -6.
  • 6DUALE AY, UYAR MU. A Method Enabling Feasible Conformance Test Sequence Generation for EFSM Models[ J]. IEEE Transactions on Computers, 2004, 53(5): 614-627.
  • 7KIM YG, HONG HS, BAE DH, et al. Test cases generation from UML state diagrams[J]. IEE Proc-Softw, 1999, 146(4).
  • 8HIERONS RM , SADEGHIPOUR S, SINGH H. Testing a system specified using Statecharts and Z[ J]. Information and Software Technology, 2001, 43(2): 137 - 149.
  • 9S Demurjian,C Phillips. Middleware Security[EB/OL]. http://www.engr. uconn.edu/-steve/demurjianmiddleware-security, pdf, 2003-06.
  • 10U Lang, D Gollmann, R Schreiner. Verifiable Identifiers in Middleware Security[A]. Proe 17th Annual Computer Security Applications Conf(ACSAC) [C]. 2001.450-459.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部