期刊文献+

改进型有色Petri网的安全协议分析 被引量:2

Analysis on Improved Colored Petri Nets of Security Protocols
下载PDF
导出
摘要 针对传统有色Petri网方法在安全协议分析中存在的一些不足,提出一种新的基于有色Petri网模型的分析方法。给出改进型的基于有色Petri网的模型构造方法及协议分析的具体步骤,利用此法对具体的Helsinki协议进行建模和分析。实验证明,这种方法行之有效,且在一定程度上有利于有色Petri网安全协议向自动化分析方向发展。 An improved security protocol checking method based on colored Petri nets models is put forward,focused on the deficiencies of the traditional security protocol analysis method based on colored Petri nets.Then it is used to the Helsinki protocol by modeling and analyzing.The method is proved feasible through experiments,and in favor of developing oriented to automation analysis of security protocol based on colored Petri nets to some extent.
出处 《安徽工业大学学报(自然科学版)》 CAS 2010年第4期413-418,共6页 Journal of Anhui University of Technology(Natural Science)
基金 安徽省教育厅自然科学基金重点项目(KJ2009A136)
关键词 安全协议 有色PETRI网 形式化分析 Helsinki协议 security protocol colored Petri nets formal analysis Helsinki protocol
  • 相关文献

参考文献5

  • 1袁志祥,蒋昌俊,叶红.基于颜色Petri网的密码协议的分析[J].安徽工业大学学报(自然科学版),2002,19(4):319-324. 被引量:2
  • 2Crazzolara F, Winskel G. Petfi nets in Cryptographic Protocols[C]//Proceedings 6th FMPPTA Workshop, 2001,18(2):90-98.
  • 3Crazzolara F, Winskel G.Language, Semantics and Methods for Cryptographic Protocols[J]. Technical ,2002,17(3):321-324.
  • 4刘道斌,郭莉,白硕.一种新的安全协议验证方法[J].计算机研究与发展,2003,40(10):1514-1520. 被引量:9
  • 5Mitchell C J, Yeun C Y. Fixing a problem in the Helsinki protocol[J]. Operating Systems Review, 1998,32:21-24.

二级参考文献10

  • 1王育民 刘建伟.通信网的安全-理论与技术[M].西安:西安电子科技大学出版社,2000..
  • 2M Burrows, M Abadi, R M Needham. A logic of authentication. ACM Trans on Computer Systems, 1990, 8(1) : 18-36.
  • 3J Thayer, J Herzog, J Guttman. Strand spaces: Why is a security protocol correct? In: Proc of the 1998 IEEE Syrup on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998. 160-171.
  • 4B B Nieh, S E Tavares. Modelling and analyzing cryptographic protocols using Petri nets. In: Advancea in CryptologyAUSCRYPT'92. New York: Springer-Verlag, 1992. 275-295.
  • 5M Abadi, A Gordon. A calculus for cryptographic protocols: The spi calculus. In: Proc of the 4th ACM Conf on Computer and Communications Security. New York: ACM Press, 1997. 36-47.
  • 6R Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 2000, 13(1): 143-202.
  • 7T Murata. Petri nets: Properties, analysis and applications. Proc of the IEEE, 1989, 77(4): 541-580.
  • 8K Jensen. Coloured Petri nets: A high level language for system design and analysis. In: Advances in Petri Nets 1990, LNCS 483, New York: Springer-Verlag, 1990. 342-416.
  • 9C M Morton. A modular approach to evaluating cryptographic protocols using Petri nets [ Master dissertation ]. Queen's University, Kingston, Ontario, Canada, 1993.
  • 10M Belier, L Chang, Y Yaeobi. Privacy and authentication on a portable communication system. IEEE Journal on Selected Areas in Communications, 1993, 11(6): 821-829.

共引文献9

同被引文献16

  • 1Gu Ming-shen. The research on Petri net based on networkprotocol-using CPN to analyze and verify security protocol[D], Wuxi:Jiangnan University, 2009. .
  • 2Yuan Cong-yi. Petri net theory[M]. Beijing:Electronic Indus-try Press, 2005. .
  • 3Wang Ning-li. Analysis on improved colored Petri nets of se-cuirity protocols[J]. Anhui University of Technology, 2010,27(4) :414-415. .
  • 4Fan Hong, Feng Deng-guo. The theory and method of secur-ity protocol[M3. Beijing:Science Press, 2003. .
  • 5Qing Han-si. IPSec[M]. Beijing:Machinery Industry Press.2006. .
  • 6顾明申.基于网绺协议的Petri网研究——利用着色Petri网分析验证安全协议[D].无锡:江南大学,2009.
  • 7袁从义.Petri网理论[M].北京:电子工业出版社,2005.
  • 8卿斯汉.安全协议[M].北京:机械工业出版社,2006.
  • 9王纯子,张斌,黄光球.基于全网攻击模型的攻击策略挖掘与危险评估[J].计算机工程与应用,2012,48(4):1-4. 被引量:1
  • 10孔轶艳.行政法实质另探——一种组织理论视角[J].河池学院学报,2012,32(5):85-91. 被引量:1

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部