期刊文献+

密码协议的分层安全需求及验证 被引量:5

Hierarchy Requirements and Verification for Cryptographic Protocols
下载PDF
导出
摘要 将密码协议的安全需求分为浅层需求和深层需求 2个层面 ,阐述了密码协议的分层安全需求 .采用近世代数和时序逻辑的方法定义了形式化描述语言 ,并形式化地描述了密码协议的分层安全需求 .将类BAN逻辑与模型检查相结合 ,在Abadi Tuttle模型的基础上建立密码协议的计算模型 .以Otway Rees协议为例 。 The security requirements for cryptographic protocols were divided into shallow requirements and deep requirements. The hierarchy security requirements were illustrated. Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols. A model of computation was developed by modifying and extending the Abadi and Tuttle model, combining BAN logic and the NRL Protocol Analyzer. Using this model and theorem proving techniques, the formal requirements of the Otway Rees protocol was verified.
出处 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2002年第5期589-592,共4页 Journal of Beijing University of Aeronautics and Astronautics
关键词 密码协议 安全需求 逻辑代数 形式语言 模型检查 logic algebra formal languages theorem proving model checking
  • 相关文献

参考文献6

  • 1[1]Roscoe A W. Intensional specifications of security protocols[A]. In: Guttman J, ed. Proceedings of 9th IEEE Computer Security Foundations Workshop[C]. Los Alamitos: IEEE Computer Society, 1996. 28~38.
  • 2[2]Boyd C. Towards extensional goals in authentication protocols[J/OL].http://dimacs.rutgers.edu/workshops/security/program2/program.html,1997.
  • 3[3]Paulson L C. The inductive approach to verifying cryptographic protocols[J]. Journal of Computer Security, 1998, 6(1/2): 85~128.
  • 4[4]Abadi M, Tuttle M R. A semantics for logic of authentication[A]. In: Proceedings of the 10th ACM Symposium on Principles of Distributed Computing[C]. New York: ACM Press, 1991. 201~216.
  • 5[5]Meadows C. A model of computation for the NRL protocol analyzer[A]. In: Gong L, ed. Proceedings of Computer Security Foundations Workshop VII[C].Los Alamitos: IEEE Computer Society Press, 1994. 84~89.
  • 6[6]Syverson P F. Adding time to a logic of authentication[A]. In: Sandhu R, ed. Proceedings of the First ACM Conference on Computer and Communications Security[C]. New York: ACM Press, 1993. 97~101.

同被引文献26

  • 1赵波,刘树波,唐明,张焕国.基于硬件系统的商用密码可信计算实现方法[J].武汉大学学报(信息科学版),2004,29(11):1030-1033. 被引量:2
  • 2吴东艳,张礼勇,刘煜坤.基于USB总线的数据采集/信号发生器的设计[J].哈尔滨理工大学学报,2005,10(1):125-127. 被引量:5
  • 3阮利华,王祥,黄全平,周荣政,洪志良,蒋凤仙.USB2.0接口IP核的开发与设计[J].复旦学报(自然科学版),2005,44(1):173-177. 被引量:5
  • 4C.E.Shannon.Communication theory of secrecy system[J].Bell System Technical Journal,1949,27(4):656-715.
  • 5庞丽萍,李胜利.计算机操作系统[M].武汉:华中科技大学出版社,1997:1-20.
  • 6柴晓路.为什么需要Web服务[J].IBM developerWorks专刊,2003,.
  • 7King S. CLSSP,threat and Solutions to Web Services Security.Network Security,2003,9:8~11.
  • 8Wahlin D. XML for ASP.NET Developers.SAMS,2001.
  • 9柴晓路.SOAP Header扩展:WS-Routing和WS-Referral,IBM Corporation,2001.http:∥www-900.ibm.com/developerWorks/cn/webservices/ws-soapheadext/part2/index.shtml.
  • 10NEUMAN B, MEDVINSKY G. Requirements for network payment: the NetCheque perspective[A]. Proceedings of IEEE COMPCON'95[C]. San Francisco, 1995.32-37.

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部