期刊文献+

基于进程代数的TCG远程证明协议的形式化验证 被引量:5

Formal Verification of TCG Remote Attestation Protocols Based on Process Algebra
下载PDF
导出
摘要 可信计算组织(Trusted Computing Group,TCG)的远程证明协议是最早提出的远程证明的解决方案,其协议的形式化验证对于工程实施具有重要意义.分析了TCG远程证明协议的两种形式——直接证明协议和借助可信第三方的证明协议,对它们进行了抽象处理,得到了两种协议形式的抽象模型.在抽象模型的基础上,给出了基于进程代数的形式化描述,并分别进行了形式化验证.验证结果表明两种协议形式的并行系统均展示了期望的外部行为. Remote attestation protocol of TCG (Trusted Computing Group) is the earliest remote attestation solution for trusted computing. Two forms of TCG remote attestation are analyzed: direct remote attestation protocol and remote attestation with trusted third party protocol. And the abstract models of the above two forms are presented in which interacting channels between the whole system and the outside environment are treated as exterior channels and interacting channels between parts of the system are treated as inner channels. Based on these abstract models, we provide the process algebra-based formal descriptions, in which every part involved in the protocols is described by a process term to capture the state transitions of the system part, and we put these process terms into parallel to get the whole formal systems. Then we conduct the related formal verifications of the parallel formal system based on the axioms of process algebra. The verification results show that the formal systems of two protocols exhibit desired external behaviors.
出处 《计算机研究与发展》 EI CSCD 北大核心 2013年第2期325-331,共7页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展计划基金项目(2007CB311100) 北京市教委科技计划基金项目(JC007011201004) 北京市人才强教中青年骨干培养基金项目
关键词 可信计算 远程证明 协议验证 形式化 进程代数 trusted computing remote attestation protocol verification formalization process algebra
  • 相关文献

参考文献7

二级参考文献181

共引文献638

同被引文献30

  • 1乔海燕.安全协议验证的归纳方法与串空间形式化比较[J].计算机研究与发展,2008,45(z1):137-142. 被引量:1
  • 2吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 3李尚杰,贺也平,刘冬梅,袁春阳.基于属性的远程证明的隐私性分析[J].通信学报,2009,30(S2):146-152. 被引量:8
  • 4刘万伟,周倜,李梦君,李舟军.一种基于进程代数的安全协议验证消解算法[J].计算机工程与科学,2006,28(7):14-16. 被引量:1
  • 5Patrick Hner. Cloud Computing Security Requirements and Solutions: a Systematic Literature Review[C]. 19^th Twente Student Conference on IT, 2013.
  • 6R. La 'Quata Sumter. Cloud Computing: Security Risk Classification, ACMSE 2010, Oxford, USA.
  • 7何小虎.基于云计算的安全协议分析与设计[D].成都电子科技大学,2012.
  • 8王剑.移动终端可信接入与验证[D].同济大学,2011.
  • 9Grawrock D. TCG Specification Architecture Overview Revision 1.4.[EB/OL].[2011-05-01]. https://www. trustedcomputionggroup.org/groups/TCG 1.4 Archiecture Overview.pdf.
  • 10Shuching Wang, Wenpin Liao, Kuoqin Yan,et al. Security of cloud computing lightweight authentication protocol [J].Applied Mechanics and Materials, 2013, 284-287: 3502-3506.

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部