期刊文献+

基于PI演算的反XML重写攻击安全模型验证

Verifying the Counter XML Rewriting Attacks Model Based on PI-Calculus
下载PDF
导出
摘要 设计出一个安全模型后,要严格验证其是否满足安全需求是非常重要和必要的。利用形式化方法来检验模型是否满足了安全协议是一种有效的手段。本文针对XML重写攻击,设计出了一个反XML重写攻击的安全模型,然后运用Pi演算形式化方法验证了其有效性、真实性和安全性。 It is very important and necessary to check the security of a model. And it is effective to use formal methods to verify the model. In this paper, we use pi - calculus to verify availability, authenticity and security properties of Counter XML Rewriting Attack Model.
作者 吴铮 段友祥
出处 《微计算机应用》 2008年第4期39-43,共5页 Microcomputer Applications
关键词 PI演算 SOAP XML重写攻击 验证 Pi - Calculus, SOAP, XML Rewriting Attack, Verify
  • 相关文献

参考文献4

二级参考文献10

  • 1MackHendricks BenGalbraith著.JavaWeb服务编程指南[M].北京:电子工业出版社,2002..
  • 2王昱.WebServices带来了什么[EB/OL].http://gceclub.sun.com.cn.,.
  • 3Abadi M,Gordon A D. A calculus for cryptographic protocols:The spi calculus. In:the Proc. of the Fourth ACM Conf. on Computer and Communications Security, 1997
  • 4Abadi M,Gordon A D. A calculus for cryptographic protocols:The spi calculus: [Technical Report 414]. University of Cambridge Computer Laboratory, 1997
  • 5Abadi M,Gordon A D. Reasoning about cryptographic protocols in the spi calculus. In: CONCUR'97: Concurrency theory, volume 1243 of Lecture Notes in Computer Science, 1997.59-73
  • 6Abadi M,Gordon A D. A Bisimulation Method for Cryptographic Pro-tocols. Nordic Journal of Computing, 1998,5(4): 267-303
  • 7Milner R,Parrow J, Walker D. A calculus of mobile processes,Parts Ⅰ and Ⅱ .Information and computation,1992
  • 8Milner R. Communication and Concurrency. Prentice-Hall International, 1999
  • 9Neuman B C, Ts'o T. Kerberos: An Authentication service for com-puter network. IEEE Communications Magazine, 1994
  • 10Schneier B. Applied Cryptography Second Edition:Protocols,algorithms and source code in c. Wiley,1996

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部