期刊文献+

一种新的安全协议设计方法

The Design of Network Protocols Based on PDS
下载PDF
导出
摘要 已有的安全协议往往被证实并不如它们的设计者所期望的那样安全,如何设计才能确保协议的安全性是目前研究的难点之一.通过介绍目前安全协议设计的主要思路和方法,说明了PDS系统的主要内容和方法,推导出了ISO-9798-3协议. It was often confirmed that security protocols were not as safe as the designers hope. To design a network protocol guaranteed secure is very difficult. The main ideas and methods of security protocol design and the PDS are introduced, and presents the derivation of the ISO-9798-3 protocol.
出处 《河南科学》 2008年第3期322-325,共4页 Henan Science
基金 国家自然科学基金资助项目(90204015 60473021) 河南省科技攻关基金资助项目(0524220044)
关键词 安全协议 形式化设计 协议推导系统 ISO-9798-3协议 network protocol formal design PDS IS0-9798-3 protocol
  • 相关文献

参考文献11

  • 1Bird R, Gopal I, Herzberg A, et al. Systematic design of a family of attack resistant authentication protocols [J]. IEEE Journalon Selected Areas in CommunicationS, 1993, 11 (5) :679-693.
  • 2Diffie W, Van Oorschot P C, Wiener M J. Authentication and authenticated key exchanges[J]. Designs, Codes and Cryptography, 1992 (2) : 107-125.
  • 3Perrig A, C anetti R, Song D X, et al. Efficient and secure source authentication for multicast [C] // Proceedings of the ISOC Symposium on Network and Distributed System Security, San Diego: CA, 2001, (2) : 35-46,
  • 4Bellare M, Canetti R, Krawczyk H. A modular approach to the design and analysis of authentication and key exchange protocols [C]//Proceedings of the 30th Annual Svmvosium on the Theory of Computing. New York: ACM Press, 1998. 419-428.
  • 5Clark J A, Jacob J L. Engineering tradeoffs and the evolution of provably secure protocols[C]//Proceedings IEEE Symposium on Research in Security and Privacy. IEEE, 2000: 82-95.
  • 6Datta A, Derek A, Mitchell J C, et al. A derivation system for security protocols and its logical formalization [C]// Proceedings of 16th IEEE Computer Security Foundations Workshop .IEEE, 2003: 109-125.
  • 7Datta A, Derek A, Mitchell J C, et al. Abstraction and refinement in protocol derivation[C]//Proceedings of 17th IEEE Computer Security Foundations Workshop. IEEE, 2004: 30-45.
  • 8Datta A, Derek A, Mitchell J C, et al. A derivation system and compositional logic for security protocols[J]. Journal of Computer Security (Special Issue of Selected Papers from CSFW-16), 2005, 13 (3) : 423-482.
  • 9Datta A, Security analysis of network protocols: compositional reasoning and complexity-theoretic foundations [D]. CA,USA: Stanford University, 2005.
  • 10卿斯汉.安全协议的设计与逻辑分析[J].软件学报,2003,14(7):1300-1309. 被引量:69

二级参考文献13

  • 1王张宜,李莉,张焕国.网络安全协议的自动化设计策略[J].计算机工程与应用,2005,41(5):16-17. 被引量:3
  • 2A Perrig,D X Song.A first step towards the automatic generation of security protocols[C].In:Proceeding of Network and Distributed System Security Symposium,2000-02
  • 3S Perrig,D X Song.Looking for diamonds in the desert:Extending automatic protocol generation to three-party authentication and key agreement protocols[C].In:Proceedings of the 13th IEEE Computer Security Foundations Workshop,IEEE Computer Press,2000
  • 4Joshua D Guttman.Protocol design via the authentication tests[C].In:Proceedings of 15th IEEE Computer Security Foundations Workshop,IEEE Computer Society Press,2002:92~103
  • 5F J Thayer,J C Herzog,J Guttman.Strand spaces:Why is a security protocol correct[C].In:Proceedings of the 1998 IEEE Symposium on Security and Privacy,Los Alamitos:IEEE Computer Society Press,1998:160~171
  • 6John A Clark,Jeremy L Jacob.Protocols are Programs Too:the Metaheuristic Search for Security protocols[J].Information and Software Technology,2001, 43:891~904
  • 7N Heintze,J Tygar.A Model for Secure Protocols and Their Compositions[J].IEEE Transactions on Software Engineering,1994,22(1):16~30
  • 8L Gong,P Syverson.Fail-Stop protocols:an approach to design secure protocols[C].In:Proceedings of DCCA-5 Fifth International Working Conference on Dependable Computing for Critical Applications,Oakland:IEEE Computer Society Press,1998:79~100
  • 9C Meadows.Formal verification of cryptographic protocols:a survey[C].In:Proceedings of ASIACRYPT'94,Springer Verlag,1995:135~150
  • 10C Rudolph.A Formal Model for Systematic Design of Key Establishment Protocols[C].In:Proceedings of the Third Australasian Conference on Information Security and Privacy,Brisbane Queensland,Australia:Springer Verlag,1998:332~343

共引文献68

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部