期刊文献+

安全协议系统安全属性定量计算方法

A quantitative approach for computing the security property of security protocol system
下载PDF
导出
摘要 定量分析安全协议系统是保证协议安全的必要环节。根据建立的安全协议系统的SMRP模型,给出了安全协议系统安全属性的计算方法,并从攻击者的角度讨论其累积报酬计算问题,通过NS协议(公钥协议)实例给出了分析过程,很好地解释了以NS协议为基础的安全协议系统未产生重大损失的原因。结果表明,SMRP模型可以较好地定量分析安全协议系统。 Quantitative computing is of great importance in security evaluation. The problem of quantitatively computing the security property of a security protocol system is discussed. A SMRP model for security protocol systems is proposed, based on which an approach to solving the problem is given. From the viewpoint of an attacker, the approach discusses the computation of the accumulated rewards of the attacker. As an example, the NS protocol is analyzed. The analysis result explains the reason why the security protocol system based NS protocol couldn't have incurred a great loss.
出处 《桂林电子科技大学学报》 2007年第6期487-490,共4页 Journal of Guilin University of Electronic Technology
基金 广西研究生教育创新资助项目(2007105950812M16)
关键词 安全协议系统 定量计算 安全属性 SMRP security protocol system quantitative computing security property SMRP
  • 相关文献

参考文献11

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2ORTALO R, ORTALO R, DESWARTES Y, KAANICHE M. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Transactions on Software Engineering, 1999,25 (5) : 633-650.
  • 3JONSSON E. A quantitative model of the security intrusion process based on attacker behavior[J]. IEEE Transations on Software Engineering, 1997,23(4) :235-245.
  • 4陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 5冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 6方滨兴.信息安全属性可计算性初探[EB/OL].[2007-09-11].http://down, clw. cn/Conference/20060919130745. shtml.
  • 7MADAN B,VAIDYANATHAN K. A method for modeling and quantifying the security attributes of intrusion tolerant systems [J]. Performance Evaluation,2004,56(1-4):167-186.
  • 8殷丽华,方滨兴.入侵容忍系统安全属性分析[J].计算机学报,2006,29(8):1505-1512. 被引量:27
  • 9KATERINA GOSEVA-POPSTOJANOVAL, FEIYI WANG, RONG WANG, FENGMIN GONG, KALYANARAMAN VAIDYANATHAN, KISHOR TRIVEDIL, BALAMURUGAN MUTHUSAMY. Characterzing Intrusion Tolerant Systems Using A State Transition Model[C][s.l.] : Proceedings of DARPA Information Survivability Conference & Exposition Ⅱ, 2001,2:211-221.
  • 10ROGER NEEDHAM, MICHAEL SCHROEDER. Using encryption for authentication in large networks of computers[J]. Communications of the ACM, 1978,21 (12):998-999.

二级参考文献73

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 3United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.
  • 4National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide(DRAFT)[Z]. June 2001.
  • 5BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169[R]. December 2001.
  • 6BUTLER S A. Security Attribute Evaluation Method: A Cost-Benefit Approach[Z]. Computer Science. Department, 2001.
  • 7PELTIER T R. Information Security Risk Analysis[Z]. Rothstein Associates Inc, 2001.
  • 8Qu G.,Jayaprakash,Ramkishore M.,Hariri S.,Raghavendra C.S.A framework for network vulnerability analysis.In:Proceedings of the 1st IASTED International Conference on Communications,Internet,Information Technology (CⅡT2002),St.Thomas,Virgin Islands,USA,2002,289~298
  • 9Moore A.P.,Ellison R.J.,Linger R.C.Attack modeling for information security and survivability.Carnegie Mellon Univer sity:Technical Note CMV/SEI-2001-TH-001,2001
  • 10Jonsson E.,Olovsson T.A quantitative model of the security intrusion process based on attacker behavior.IEEE Transactions on Software Engineering,1997,23(4):235~245

共引文献736

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部