期刊文献+

一种基于虚拟组织的网格安全协议形式化验证方法

New formal verification method of grid security protocols based on virtual organization
下载PDF
导出
摘要 虚拟组织是网格计算的基本管理单元,而协同计算组是虚拟组织形成的基础。对应于网格计算的复杂性,网格安全协议的分析与证明十分复杂。通过引入网格计算信道的概念,在传统Strand Space理论的基础上提出了一种基于虚拟组织的网格安全协议形式化验证方法,实现了网格环境下多用户协同计算安全协议的分析与证明。 VO(Virtual Organization) is the basic management unit of grid computing,and coordinative computing group is the base of VO.The analysis and verification of security protocols in grid computing are very complex due to the complexity of grid computing.In this paper,The notion of grid computing channel is introduced and a formal verification method of grid security protocols based on the traditional Strand Space theory is defined to provide analysis and verification for security protocols of muhiuser coordinative computing in grid environment.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第24期117-122,145,共7页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.90412007)
关键词 网格协同计算形式化分析虚拟组织StrandSpace grid coordinative computing formal verification virtual organization Strand Space
  • 相关文献

参考文献29

  • 1WS-Resource Framework[EB/OL].http://www.oasis-open.org/apps/org/workgroup/wsrf/.
  • 2Siebenlist F.Grid security:requirements,plans and ongoing efforts[C]//ACM workshop on XML security,Fairfax,Virginia,2003.
  • 3Foster I,Kesselman C.The Grid:blueprint for a new computing infrastructure[M].[S.l.]:Morgan Kaufman Publishers,2004.
  • 4Burrows M,Abadi M,Needham R.A logic of authentication[C]//Proceedings of the Royal Society of London,1989,426:233-271.
  • 5Gong L,Needham R,Yahalom R.Reasoning about belief in cryptographic protocols[C]//Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy.Los Alamitos:IEEE Computer Society Press,1990:234-248.
  • 6Abadi M,Tuttle MR.A semantics for a logic of authentication[C]//Proceedings of the 10th ACM Symposium on Principles of Distributed Computing.[S.l.]:ACM Press,1991:201-216.
  • 7Van Oorschot P C.Extending cryptographic logics of belief to key agreement protocols.Proceedings of the 1st ACM Conference on Computer and Communications Security[M].[S.l.]:ACM Press,1993:233-243.
  • 8Syverson P F,Van Oorschot P C.On unifying some cryptographic protocol logics[C]//Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy.Los Alamitos:IEEE Computer Society Press,1994:14-28.
  • 9Bieber P.A Logic of Communication in a Hostile Environment[C]//Proceedings of the Computer Security Foundations Workshop Ⅲ.Los Alamitos:IEEE Computer Society Press,1990:14-22.
  • 10Syverson P.Formal semantics for logics of cryptographic protocols[C]//Proceedings of the Computer Security Foundations Workshop Ⅲ.Los Alamitos:IEEE Computer Society Press,1990:32-41.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部