期刊文献+

安全协议形式化分析方法的融合性研究

The fusion research of approaches in formal analysis of security protocols
下载PDF
导出
摘要 分析了BAN逻辑和串空间理论的特点与不足.为了弥补二者的不足,提出了一种融合两种理论的形式化分析方法.通过实例分析,证明该分析方法能够将BAN逻辑和串空间的优点互补综合,使安全协议的分析更可靠、稳定、高效. Features and inadequacies of BAN logic and strand space are analysed in this paper.In order to compensate for inadequacies of the two approaches,a fusion formal analysis method is presented.Through a case study,it is demonstrated that this method can integrate the advantages of the BAN logic and strand space,and thus the analysis of security protocols become more reliable,stable and efficient.
作者 卜奎昊
出处 《西北师范大学学报(自然科学版)》 CAS 北大核心 2010年第5期40-44,共5页 Journal of Northwest Normal University(Natural Science)
基金 安徽省教育厅科研基金资助项目(KJ2007B239)
关键词 安全协议 Helsinki协议 BAN逻辑 串空间 security protocol Helsinki protocol BAN logic strand space
  • 相关文献

参考文献9

  • 1陈春玲,田国良.安全协议的SPIN建模与分析[J].南京航空航天大学学报,2009,41(5):672-676. 被引量:3
  • 2SUFATRIO N, YAP R H C. Extending BAN logic for reasoning with modern PKI-based protocols[M]// Proceedings of 2008 IFIP International Conference on Network and Parallel Computing.[s. l. ] : IEEE Computer Society, 2008: 190-197.
  • 3YU Ming, MALVANKAR A, SU Wei, et al. A link availability-based QoS-aware routing protocol for mobile ad hoc sensor networks [J]. Computer Communications, 2007, 30(18) : 3823-3831.
  • 4XIAO Mei-hua, LI Jing. The modeling analysis of cryp to graphic protocols using promela [M]// Proceedings of the World Congress on Intelligent Control and Automation. Dalian: IEEE Computer Society, 2006: 4321-4325.
  • 5张玉清,王磊,肖国镇,吴建平.Needham-Schroeder公钥协议的模型检测分析[J].软件学报,2000,11(10):1348-1352. 被引量:29
  • 6CHEN Chun-ling,YU Han,LU Heng-shan,WANG Ru-chuan.Novel analysis and improvement of Yahalom protocol[J].The Journal of China Universities of Posts and Telecommunications,2009,16(2):80-83. 被引量:1
  • 7HOLZMANN G J. The Spin Model Checker: Primer and Reference Manual [M]. Upper Saddle River: Addison-Wesley, 2003: 30-60.
  • 8MORDECHAI B A. Principles of the Spin Model Checker[M]. New York: Springer, 2007: 20-60.
  • 9MITCHELL C J, YEUN C Y. Fixing a problem in the Helsinki protocol [J]. Operating Systems Review, 1998, 32(4): 21-24.

二级参考文献12

  • 1Sufatrio N, Yap R H C. Extending BAN logic for reasoning with modern PKI-based protocols [C]// 2008 IFIP International Conference on Network and Parallel Computing. [S. l.]:IEEE Computer Society, 2008:190-197.
  • 2Chen Chunling, Yu Han, Ltl Hengshan, et al. Novel analysis and improvement of Yahalom protocol [J]. The Journal of China Universities of Posts and Telecommunications. 2009,16 (2) : 80-83.
  • 3Mordechai B A. Principles of the spin model checker[M]. New York: Springer-Verlag LLC. 2007: 20- 60.
  • 4Holzmann G J. The spin model checker: primer and reference manual[M]. New Jersey : Addison-Wesley, 2003.
  • 5Kaliappan P S, Koenig H, Kaliappan V K. Designing and verifying communication protocols using model driven architecture and spin model checker[C]// International Conference on Computer Science and Software Engineering. Wuhan, China : [s. n. ], 2008, 2:227-230.
  • 6Xiao Meihua, Li Jing. The modeling analysis of cryptographic protocols using promela [ C ]// Proceedings of the World Congress on Intelligent Control and Automation. New Jersey: IEEE, 2006: 4321-4325.
  • 7Horng G, Hsu C K. Weakness in the Helsinki protocol[J]. Electronic Letters, 1998, 34(7) :354-355.
  • 8Mitchell C J, Yeun C Y. Fixing a problem in the Helsinki protocol [J]. Operating Systems Review, 1998, 32(4):21-24.
  • 9Dang Z,DIMACS Workshop on Design and Form al Verification of Security Protocols.http:/,1997年
  • 10卿思汉.安全协议[M].北京:清华大学出版社,2005:97-98.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部