期刊文献+

安全协议UML模型的SPIN分析

Analysis for UML Model of Security Protocols Using SPIN
下载PDF
导出
摘要 统一建模语言(UML)是设计和建模安全协议的常用方法,但UML缺少精确的语义,不能对协议模型作进一步分析和验证;Promela是一种具有精确语义的形式化语言,通过Promela规范给协议的UML模型赋予精确语义可以结合两者的优势,提出一种将安全协议UML模型转换成Promela规范的方法,定义了转换规则实现模型间的转换,实例表明该方法的可行性。 Unified Modeling Language ( protocol. But it ' s lack of precise semantics, UML) is a commonly used method in designing and modeling security which leads to the weakness in analyzing and validating UML models. Promela is a formal language with precise semantics. The advantages of these two languages can be combined per- fectly when the former is endowed with the precise semantics from the latter. A method of translating UML model to Promela specification is proposed,which provides the transform rules, and shows the feasibility with case study.
出处 《南昌大学学报(工科版)》 CAS 2008年第2期170-174,共5页 Journal of Nanchang University(Engineering & Technology)
基金 江西省自然科学基金资助项目(0411041 0611057 2007GZS1884) 2007年南昌市重点攻关及产业化科技资助项目(Z04028)
关键词 安全协议 统一建模语言 模型检测 SPIN/Promela security protocol unified modeling language model checking SPIN/Promela
  • 相关文献

参考文献10

  • 1邵维忠,梅宏.统一建模语言UML述评[J].计算机研究与发展,1999,36(4):385-394. 被引量:102
  • 2Holzmann G J. The SPIN Model Checker, Primer and Reference Manual [ M ]. Boston, USA : Addison-Wesley, 2003.
  • 3Diego Latella, Istvan Majzik, Mieke Massink. Automatic verification of a behavioral subset of UML Statechart Diagrams using the SPIN Model Checker [ J ]. Formal Aspects of Computing, 1999, 11:637 - 664.
  • 4Beek M vonder. A Structured Operational Semantics for UML-Statecharts [ J ]. Softuare and Systems Modeling, Springer-Verlag,2002,1 (2) : 130 - 141.
  • 5董威,王戟,郑延平,齐治昌.UML状态机的模型检验方法[J].计算机工程与科学,2001,23(6):7-11. 被引量:7
  • 6David C Kung, Yue Lei, Parikshit Singh, et al. An Object - Oriented Framework for Modeling and Analysis of Security Protocols [ R ]. Arlington: Department of Computer Science and Engineering, UTA, 2003.
  • 7Daivd Kung, Wesam Okasha, Ashraf All. Modeling and Validation of Security Protocols by Using the Object Oriented Framework and SPIN [ R ]. Arlington: Department of Computer Science and Engineering University of Texas at Arlington, UTA,2003.
  • 8Lowe G Towards a Completeness Result for Model Checking of Security Protocols [ C ]//Proceedings of the Computer Security Foundations Workshop Ⅺ, 1998.
  • 9Dolev D, Yao A. On the Security of Public Key Protocols [J]. IEEE Transactions on Information Theory, 1983,29 (2) :198 -208.
  • 10Needham R M, Schroeder M D. Using Encryption for Authentication in Large Networks of Computer[ J]. Communications of the ACM, 1978,21:993 - 999.

二级参考文献1

  • 1Lilius J,TUCS Technical Report,1999年,272期

共引文献107

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部