期刊文献+

一种基于有色Petri网的安全协议分析方法研究 被引量:2

Research of security protocols analysis language based on coloured Petri net
下载PDF
导出
摘要 利用有色Petri网建模工具CPN tools中的查询函数对安全属性进行描述,搭建一个能够覆盖大部分安全性质的CPN查询函数库,提出一种基于CPN的通用和规范的安全协议形式化分析语言,该语言可以像用面向对象编程语言编程一样对安全协议进行建模。 Using the query faction of CPN tool to describ the security attribute. Building a CPN query function database which contained the most security attribute. This paper presents a formal analysis language of security protocols which general and standardization based on CPN. This language can build the model of security protocols like as object-oriented-programming language.
作者 苏桂平 孙莎
出处 《微型机与应用》 2011年第15期1-3,7,共4页 Microcomputer & Its Applications
关键词 有色PETRI网 安全协议 形式化分析 面向对象编程语言 coloured Petri net security protocol formal analysis OOPL
  • 相关文献

参考文献6

  • 1李梦君,李舟军,陈火旺.安全协议的扩展Horn逻辑模型及其验证方法[J].计算机学报,2006,29(9):1666-1678. 被引量:7
  • 2怀进鹏,李先贤.密码协议的代数模型及其安全性[J].中国科学(E辑),2003,33(12):1087-1106. 被引量:1
  • 3冯登国,范红.安全协议理论与方法[M].北京:科学出版社.2003.
  • 4YASINSEC A. A formal semantics for evaluating eryptographic protocols[D]. University of Virginia, 1996.
  • 5MILLEN J. CAPSL: common authentication protocol specification language [R]. Technical Report MP97B48, The MITRE Corporation, 1997.
  • 6Wei Jin, Su Guiping. An integrated model to analyze eryptographic protocols with colored Petri Nets. In Proceeing [C]. l lth IEEE Symposium on High Assurance Systems Engineering Symposium, 2008.

二级参考文献29

  • 1李梦君,李舟军,陈火旺.基于进程代数安全协议验证的研究综述[J].计算机研究与发展,2004,41(7):1097-1103. 被引量:25
  • 2李梦君,李舟军,陈火旺.基于逻辑程序的安全协议验证[J].计算机学报,2004,27(10):1361-1368. 被引量:7
  • 3李梦君,李舟军,陈火旺.SPVT:一个有效的安全协议验证工具[J].软件学报,2006,17(4):898-906. 被引量:18
  • 4[1]Meadows C. A model of computation for the NRL protocol analyzer. In: Proceedings of the 1994 Computer Security Foundations Workshop, Franconia, NH, USA, 1994. 84~89
  • 5[2]F′abrega F J T, Herzog J C. Guttman J D. Strand spaces: Proving security protocols correct. Journal of Computer Security, 1999, 191~230
  • 6[3]F′abrega F J T, Herzog J C, Guttman J D. Strand spaces: Why is a security protocol correct? In: Proceedings of the 1998 IEEE Symposium on Security and Privacy. Oakland: IEEE Computer Press, 1998. 160~171
  • 7[4]Paulson L C. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998, 6: 85~128
  • 8[5]Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1996. 147~166
  • 9[6]Mitchell J C, Mitchell M, Stern U. Automated analysis of cryptographic protocols using murφ. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1997
  • 10[7]Clarke E M, Jha S, Marrero W. Verifying security protocols with brutus. ACM Transactions on Software Engineering and Methodology, 2000, 9(4): 443~487

共引文献6

同被引文献11

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部