期刊文献+

安全协议形式化分析方法 被引量:5

On Methods and Techniques for Formal Analysis of Security Protocols
下载PDF
导出
摘要 安全协议的形式化分析是检验协议安全性的必要手段。为了实现协议的规范描述和合理完备的安全性验证,各种数学理论和人工智能方法被引进安全协议形式化分析与自动化验证领域。主要从逻辑方法、模型检测方法和证明方法3个方面对符号化的安全协议形式化分析方法进行了综述,并指出了今后该领域的研究方向。 Formal analysis of security protocols is the necessary measure for proof-testing of protocol security properties. In order to implement the specification of protocols and verification of security properties soundly and completely, many mathematical theories and artificial intelligence approaches are brought into the security protocols' formal analysis and automatic verification fields. In this pa- per, a survey in formal analysis methods for security protocols is presented, including logic-based, model checking based and proof-based, several research directions are pointed out in the end.
出处 《信息工程大学学报》 2008年第3期272-276,共5页 Journal of Information Engineering University
基金 国家自然科学基金资助项目(60503012)
关键词 安全协议 形式化方法 逻辑 模型检测 证明 security protocol formal method logic model checking proof
  • 相关文献

参考文献15

  • 1Roy A, Datta A, Derek A, et al. Secrecy Analysis in Protocol Composition Logic, in Formal Logical Methods for System Security and Correctness [ M ]. IOS Press, 2008.
  • 2Abadi M, Blanchet B. Analyzing Security Protocols with Secrecy Types and Logic Programs [ C]//29th ACM SIGPLAN-SIGACT Syposium on Principles of Programming Languages. Portland, Oregon, 2002:33 - 44.
  • 3Cohen E. First-order verification of cryptographic protocols [ J]. Journal of Computer Security, 2003, 11 (2) :189 -216.
  • 4Bozzano M, Delzanno G. Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols. Journal of Symbolic Computation[ J]. 2004,38(5) :1375 - 1415.
  • 5Durgin N, Mitchell J C , Pavlovic D. A compositional logic for proving security properties of protocols [ J]. Journal of Computer Security,2003,11 (4) :677 - 721.
  • 6Lowe G, Auty M. On a calculus for security protocol development[R]. Technical report, Oxford University, 2005.
  • 7Basin D, Modersheim S, Vigano L. OFMC: A Symbolic Model-Checker for Security Protocols [ J]. International Journal of Information Security, 2005,4(3 ) : 181 - 208.
  • 8Alessandro Armando, Luca Compagna. SAT-based model-checking for security protocols analysis [ J]. International Journal of Information Security, 2008,7 ( 1 ) : 3 -32.
  • 9Turuani M,Rusinowitch M. Protocol insecurity with finite number of sessions is NP-complete [ C ]//14th Computer Security Foundations Workshop. IEEE, 2001:174 - 187.
  • 10Huima A. Efficient infinite-state analysis of security protocols[ C]// Workshop on Formal Methods and Security Protocols, FLOC. 1999 : 156 - 160.

同被引文献39

  • 1叶茂,罗万伯.TNC架构的应用研究[J].信息安全与通信保密,2006,28(1):58-60. 被引量:8
  • 2薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 3黎波涛,罗军舟.不可否认协议时限性的形式化分析[J].软件学报,2006,17(7):1510-1516. 被引量:13
  • 4彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 5吴开贵,陈明.对SVO逻辑方法的改进[J].哈尔滨工程大学学报,2007,28(5):542-547. 被引量:4
  • 6KATTI S, RAHUL H, HU W. XORs in the air: practical wireless network coding[J]. IEEE/ACM Transactions on Networking, 2008, 16(3):497-510.
  • 7LE J L, JOHN LUI C S, CHIU D M. DCAR: dsitributed coding-aware routing in wireless networks[J]. IEEE Transactions on Mobile Com- puting, 2010, 9(4): 596-608.
  • 8KANNHAVONG B, NAKAYAMA H, NEMOTO Y. A survey of routing attacks in mobile ad hoc networks[J]. Wireless Communication, 2007, 14(5): 85-91.
  • 9DONG J, REZA C, CRISTINA N R. Secure network coding for wire- less mesh networks: threats, challenges, and directions[J]. Computer Communications, 2009, 32(17):1790-1801.
  • 10PAPADIMITRATOS P, HAAS Z. Secure routing for mobile ad hoc networks[A]. The Communication Networks and Distributed System Modeling and Simulation Conference [C]. San Antonio, 2002. 27-31.

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部