期刊文献+

Andrew Secure RPC协议的一种组合分析方法 被引量:1

A Combined Analysis Method of Andrew Secure RPC Protocol
下载PDF
导出
摘要 逻辑方法和模型检验方法是安全协议的两种重要分析方法。逻辑方法简单、直观,但其最大问题是不够完备,模型检验方法自动化程度高且能生成不满足所需求性质的反例。先用BAN逻辑对Andrew Secure RPC协议进行分析,并在此基础上组合模型检验方法进行分析,结果表明逻辑方法组合模型检验方法分析协议比只用逻辑方法分析得到的结果更全面且更具体。 Logic and model checking are two important analysis methods of security protocols.Logic is simple and visual but it is not complete enough.Model checking has high automation and can generate counter examples which do not satisfy the properties needed.In the paper,Andrew Secure RPC protocol is firstly analyzed by BAN logic,then it is analyzed by model checking on the base.The result shows that compared with logic method,the combined method can get more overall and more specific results.
出处 《四川理工学院学报(自然科学版)》 CAS 2008年第4期43-46,共4页 Journal of Sichuan University of Science & Engineering(Natural Science Edition)
关键词 逻辑方法 模型检验方法 组合方法 ANDREW SECURE RPC协议 Logic Model checking Combined method Andrew Secure RPC protocol
  • 相关文献

参考文献5

  • 1Burrows M,Abadi M,Needham R. A logic of authentication. Technical Report 39, Digital Systems Research Center, 1989.
  • 2Lowe G. Some new attacks upon security protocols:proceedings of the Computer Security Foundations Workshop Ⅷ[C]. IEEE Computer Society Press,1996.
  • 3McMillan K L. Symbolic model checking[D].PHD thesis.University of Carnegie Mellon,Pittsburgh,USA,1992.
  • 4Marco Bozzano, Giorgio Delzanno. Automatic verifycation of secrecy properties for linear logic specifications of cryptographic protocols [J].Journal of Symbolic Computation. 2004.38(3): 1375-1415.
  • 5刘霞,古天龙,董荣胜,郭云川.移动环境公平支付协议的设计与分析研究[J].通信学报,2007,28(4):32-37. 被引量:2

二级参考文献9

  • 1Mastercard,Visa.Secure electronic transactions specification[EB/OL].http://www.setco.org/set_specifications.html,1997.
  • 2BRICKELL E,GEMMELL P,KRAVITZ D.Trustee-based tracing extensions to anonymous cash and the making of anonymous change[A].Proceedings of the 6th ACM-SIAM Symposium on Discrete Algorithms[C].San Francisco,California,USA,1995.457-466.
  • 3TSALGATIDO A,PITOURA E.Business models and transactions in mobile electronic commerce:requirements and properties[J].Computer Networks,2001,37(2):221-236.
  • 4ASOKAN N.Fairness in Electronic Commerce[D].University of Waterloo,Ontario,Canada,1998.
  • 5PARK J M,RAY I,CHONG E K P,et al.A certified e-mail protocol suitable for mobile environments[A].Global Telecommunications Conference[C].San Francisco,CA,USA,2003.394-1398.
  • 6HAO W,HEQ G.Achieving fairness in wireless environment[A].IEEE 6th CAS Symposium on Emerging Technologics:Mobile and Wirelsss Communication[C].Shanghai,China,2004.117-120.
  • 7MCMILLAN K L.Symbolic Model Checking[M].USA:Kluwer Academic Publishers,1993.
  • 8KUNGPISDAN S,SRINIVASAN B,PHU D L.A secure account-based mobile payment protocol[A].International Conference on Information Technology:Coding Computing[C].Las Vegas,NV,USA,2004.5-39.
  • 9张玉清,王磊,肖国镇,吴建平.Needham-Schroeder公钥协议的模型检测分析[J].软件学报,2000,11(10):1348-1352. 被引量:29

共引文献1

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部