期刊文献+

基于Petri网的可信连接架构的安全属性分析

Security attributes analysis of trusted connect architecture based on Petri net
下载PDF
导出
摘要 为确保可信连接架构(TCA)自身的安全可靠,研究了其安全属性量化问题,分析了其双向用户身份认证和平台认证过程中存在的安全威胁。利用随机Petri网对带有攻击行为的TCA可信网络连接过程进行了建模,该模型用于描述攻击行为和TCA的双向认证过程。以该模型为基础构造了马尔科夫链,通过计算马尔科夫模型的稳定状态概率对TCA的稳定状态机密性和完整性等安全属性进行定量分析。最后给出了一个具体数值评估结果的实例。此研究给出的方法有理论和实用意义。 From the purpose of ensuring the security and reliability of the trusted connect architecture ( TCA), the issues related to quantifying its security attributes were studied, and the security threats in its bi-directional user identity authentication and platform authentication were analyzed. The trusted network connect process under attack behav- iors was modeled as a stochastic Petri net. This model was used to describe attack behaviors and hi-directional au- thentication process in TCA. The main security attributes of confidentiality and integrity were analyzed and quantified by computing the steady state probability of a Markov model derived from the stochastic Petri net. Finally, the model analysis was illustrated in a numerical example. The method demonstrated in the study is of theoretical and practical significance.
作者 任兴田
出处 《高技术通讯》 CAS CSCD 北大核心 2012年第8期812-818,共7页 Chinese High Technology Letters
基金 973计划(2007CB311100)资助项目.
关键词 可信计算 可信连接架构(TCA) 安全属性 定量分析 随机PETRI网 trusted computing, trusted connect architecture (TCA), security attribute, quantification analysis, stochastic Petri net
  • 相关文献

参考文献11

  • 1Trusted Computing Group. Trusted network connect-TNC architecture for interoperability specification version 1.3.http ://www. trustedcomputinggroup, org: TCG, 2008.
  • 2可信计算标准工作组.可信计算标准研究报告第5部分:可信连接架构.北京工业大学,2008.
  • 3Madan B B, Popstojanova K G, Vaidyanathan K, et al. A method for modeling and quantifying the security attrib- utes of intrusion tolerant systems, peCormance Evalua-tion, 2004, 56(124): 167-186.
  • 4Wang D, Madan B B, Trivedi K S. Security analysis of SITAR intrusion tolerance system. In: Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems: in Association with 10th ACM Conference on Computer and Communications Security 2003. New York : ACM, 2003. 23-32.
  • 5Dacier M, Deswarte Y, Kaaniche M. Quantitative assess- ment of operational security: models and tools. Laborato- ry for Analysis and Architecture of Systems, 1996.
  • 6罗安安,林闯,王元卓,邓法超,陈震.可信网络连接的安全量化分析与协议改进[J].计算机学报,2009,32(5):887-898. 被引量:21
  • 7Asokan N, Niemi V, Nyberg K. Man in the middle at- tacks in tunneled authentication protocols, http ://eprint. iacr. org/2002/163 : Cryptology ePrint Archive, 2002.
  • 8Jonsson E, Olovsson T. A quantitative model of the secur- ity intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 1997, 23 ( 4 ) : 235 -245.
  • 9Ortal R, Deswarte Y, Kaaniche M. Experiments with quantitative evaluation tools for monitoring operational se- curity. IEEE Transactions on Software Engineering, 1999, 25(5): 633-650.
  • 10林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92

二级参考文献69

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3向冬,王润孝,石乘齐,姜晓鹏.基于可信网络连接的数据采集系统访问控制模型[J].计算机应用研究,2006,23(12):157-158. 被引量:4
  • 4Zhang Xin-Wen, Chen Song-Qing, Ravi Sandhu. Enhancing data authenticity and integrity in P2P systems. IEEE Internet Computing, 2005, 9(6): 42-49
  • 5Xu Gang, Borcea Cristian, Iftode Liviu. Trusted applicationcentfic Ad-Hoc networks//Proceedings of the MASS07. Pisa,Italy, 2007
  • 6IEEE802. Port-based network access control. IEEE Std 802. 1X-2001, June 2001
  • 7Trusted Computing Group. TCG Trusted Network Connect TNC Architecture for Interoperahility Specifieation Version 1.3. Release 6 TCG Published, April, 2008:7-35
  • 8Trusted Computing Group. TCG 1.1b Specification Architecture Overview. Revision 0. 14, March, 2004
  • 9Trusted Computing Group. TCG Trusted Network Connect TNC IF-TNCCS Specification Version 1.1 Revision 1.0, TCG published, February, 2007: 20
  • 10Trusted Computing Group. TCG Trusted Network Connect TNC IF-T: Protocol Bindings for Tunneled EAP Methods Specification Version 1.0 Revision 3, TCG published, May, 2006: 9-30

共引文献108

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部