期刊文献+

一种安全协议自动化分析方法 被引量:1

Kind of automated analysis method of security protocol
下载PDF
导出
摘要 提出了一种基于串空间的安全协议自动化分析模型,该模型运用一系列算法实现协议的自动化分析,克服了冗长的理论推导,使协议的分析更加简洁和直观。模型的主要功能已在MyEclipse环境下用Java编程实现,并首次运用实现后的自动化分析模型对改进前后的Helsinki协议进行分析验证,证明了该自动化分析方法的简洁性和有效性。 This paper presented an automated analysis model based on strand space of security protocol. The model achieved automatic analysis by using a series of algorithms and overcame the disadvantage of manual analysis of security protocol, so it made security protocol analysis more simple and intuitive.The model implemented its function by coding in MyEclipse environment with Java. The proposed approach compares and analyzes Helsinki protocol for the first time, and the results show that the method is simple and efficient.
出处 《计算机应用研究》 CSCD 北大核心 2010年第6期2301-2303,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2007AA010408)
关键词 安全协议 串空间 自动化分析模型 算法 security protocol strand space automatic analysis method algorithm
  • 相关文献

参考文献7

  • 1周天凌,黄连生.Hlpsl2Cpp——一个安全协议编译器[J].计算机应用研究,2007,24(6):123-126. 被引量:1
  • 2PERRIGA,SONG D.A first step toward the automatic generation of security protocols[C] //Proc of Network and Distributed System Security Symposium(NDSS).San Diego:ISOC,2000.
  • 3THAYER F,HERZOG J C,GUTTMAN J D.Strand spaces:Why is a security protocol correct?[C] //Proc of IEEE Symposium on Secu-rity and Privacy.1998.
  • 4LOWE G.Analysing protocols subject to guessing attacks[C] //Proc of Workshop on Issues in the Theory of Security.2002.
  • 5ECKEL B.Thinking in Java[M].4th ed.[S.l.] :Prentice Hall PTR,2007.
  • 6SONG D X,PERRIG A,BEREZIN S.Athena:a novel approach to efficient automatic security protocol analysis[J].Journal of Computer Security,2001,9(1-2):47-74.
  • 7MEADOWS C.Formal methods for cryptographic protocol analysis:emerging issues and trenda[J].IEEE Journal on Selected Areas in Communication,2003,21(1):44-54.

二级参考文献12

  • 1Automated validation of Internet security protocols and applications FET Open Project IST-2001-39252 [ EB/OL]. [ 2005- 01 ]. http:// www. avispa-project. org.
  • 2PERRIG A, SONG D. A first step toward the automatic generation of security protocols: proc. of Network and Distributed System Security Symposium (NDSS) [ C ]. San Diego: ISOC,2000:73 - 83.
  • 3MULLER F, MILLEN J. Cryptographic protocol generation from CAPSL SRI International [ EB/OL ]. [ 2001 ]. http ://www. csl. sri. com/papers/generate/.
  • 4MILLEN J K. Common authentication protocol specification language: proc. of the 1996 Workshop on New Security Paradigms[C]. New York: ACM Press, 1996 : 132-134.
  • 5DIDELOT X. COSP-J:A compiler for security protocols[ D]. Oxford: Oxford University Computing Laboratory,2003.
  • 6LOWE G. Casper: A compiler for the analysis of security protocols: proc. of the 10th IEEE Computer Security Foundations Workshop [ C]. Los Angeles: IEEE CS Press, 1997:18-30.
  • 7POZZA D, SISTO R, DURANTE L. Spi2Java: automatic cryptographic protocol java gode generation from spicalculus: proc. of the 18th Int. Conf. on Advanced Information Networking and Applications (AINA) [ C ]. Los Angeles: IEEE CS Press, 2004:400-405.
  • 8TOBLER B, HUTCHISON A. Generating network security protocol implementations from formal specification: proc. of World Comp. Congress Workshop on Certification and Security in Inter-Organizational E-Services (CSES) [ C ]. Toulouse: Kluwer Academic Publisher,2004 : 102-122.
  • 9LUKELL S, VELDMAN C, HUTCHISON A. Automated attack analysis and code generation in a multi-dimensional security protocol engineering framework (SPEAR II ) : proc. of Southern African Telecommunications Networks and Apphcations Conference [ C ]. George: Telkom. 2003 :265-270.
  • 10BASIN D, MODERSHEIM S, VIGANO L. OFMC :a symbolic model checker for security protocols [ J ]. International Journal of Information Security, 2004,4(3 ) : 181-208.

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部