期刊文献+

基于事件顺序的时间戳协议处理 被引量:1

Timestamp Protocol Processing Based on Event Order
下载PDF
导出
摘要 在不考虑网络延迟的情况下,提出一种基于事件顺序的时间戳协议处理方法。在分析时间戳大小与事件关系的基础上,证明为使事件绑定时主体接收的时间戳是新的,状态转移必须满足时间戳关系无环性,并基于事件顺序给出时间戳关系无环性的验证算法。实例表明,该方法易于实现,且具有一定适用性。 This paper proposes a timestamp protocol processing method based on event order under the situation of not considering network delay.On the basis of analyzing the timestamp and event order,it proves that if the state satisfies no cycles property of timestamp,the transfer of state can main the timestamp freshness.Verification algorithm of timestamp relation no cycles property based on event order is given.Example shows that this method is simple to realize and it has certain applicability.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第23期124-126,129,共4页 Computer Engineering
关键词 协议处理 事件顺序 时间戳 protocol processing event order timestamp
  • 相关文献

参考文献4

二级参考文献24

  • 1季庆光,冯登国.对几类重要网络安全协议形式模型的分析[J].计算机学报,2005,28(7):1071-1083. 被引量:23
  • 2赵宇,王亚弟,韩继红.基于Spi演算的SSL3.0协议安全性分析[J].计算机应用,2005,25(11):2515-2520. 被引量:7
  • 3赵宇,袁霖,王亚弟,韩继红.一种改进的Woo-Lam密码协议模型[J].计算机应用,2006,26(9):2116-2120. 被引量:1
  • 4张畅,王亚弟,韩继红,郭渊博.一种改进的密码协议形式化模型[J].软件学报,2007,18(7):1746-1755. 被引量:3
  • 5Burrows M, Abadi M, Needham R. A Logic of Authentication. ACM Transactions in Computer Systems, 1990,8 (1):18-36
  • 6Dolev D, Yao A C. On the Security of,Public Key Protocols. IEEE Transactions on Information Theory, 1983, 29 (2):198- 208
  • 7Schneider S. Verifying Authentication Protocols in CSP. IEEE Transaction on Software Engineering, 1998,24(9):741-758
  • 8Broadfoot P J, Roscoe A W. Intemalising Agents in CSP Protocol Models//Proceedings of Workshop on Issues in the Theory of Security. 2002
  • 9Clarke E M , Jha S , Marrero W. Verifying Security Protocols with Brutus. ACM Transactions on Software Engineering and Methodology, 2000,9 (4) : 443-487
  • 10Woo T Y C,Lam S S. A semantic model for authentication protoeols//Proceedings of the IEEE Symposium on Research in Security and Privacy. Oakland, CA, 1993 : 178-194

共引文献1

同被引文献10

  • 1邵志远.数字时间戮应用初探[J].金融电子化,2005(12):65-67. 被引量:1
  • 2MISKINIS R, SMIRNOW D, URBA E, et al. Digital time stamping system based on open source technologies [ J]. IEEE Transactions on Uhrasonics, Ferroelectrics and Frequency Control, 2010, 57(3): 721 - 727.
  • 3MERKLE R C. A certified digital signature [C]// Crypto89: Proceedings of Advances in Cryptology, LNCS 1990. Berlin: Springer- Verlag, 1989:218-238.
  • 4GUO WEI, HUA YU, SONG KEXIN. Study on the security of time- stamping service architecture [ C]// Proceedings of the 2009 International Conference on Electronic Commerce and Business Intelligence. Washington, DC: IEEE Computer Society, 2009:28-32.
  • 5PAN XIAN, ZHENG J L. Hierarchical time-stamp protocol: Acquiring reliable time-stamp from local time stamping server [ C]//ISECS'09: Proceedings of the Second International Symposium on Electronic Commerce and Security. Washington, DC: IEEE Computer Society, 2009:251-254.
  • 6IETF. Interact X. 509 public key infrastructure time-stamp protocol (TSP) RFC time stamping, RFC 3161 [S/OL]. [2011-03-20]. http://www, left. org/rfc/rfc3161. txt?number = 3161.
  • 7MUTIA R I, SADEQUE N, ANDERSSON J A, et al. Time-stamping accuracy in virtualized environments [C]//Proceedings of the 13th International Conference on Advanced Communication Technology, Washington, DC: IEEE Computer Society, 2011 : 475 -480.
  • 8潘娴,郑建立.分层请求时间戳协议[J].上海理工大学学报,2009,31(1):90-94. 被引量:3
  • 9谢应科,王建东,祝超,赵自力,韩承德.网络测量中高精度时间戳研究与实现[J].计算机研究与发展,2010,47(12):2049-2058. 被引量:10
  • 10郭莉.时间戳技术研究[J].高性能计算技术,2003,0(3):30-33. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部