期刊文献+

安全协议的时限责任分析 被引量:6

Analyzing the Temporal Accountability of Secure Protocols
下载PDF
导出
摘要 本文针对安全协议中的时限责任问题 ,提出结合责任性与新鲜性来分析时间标记 .这种思路体现在我们新的时限逻辑框架中 ,比较Kudo[8] 的方法 ,新的逻辑体系因为有对消息完整性的判断 ,能更有效地防止消息的篡改与重发攻击 ,且更加简洁和实用 . To analyze the time-critical secure protocols,we propose a new method that combines temporal accountability and timestamp freshness verification.Comparing to Kudo's logic,our method can prevent tempar and replay attacks by adding the integrity verification based on timestamps.In addtion, our method benefits intuition and practicality.
出处 《电子学报》 EI CAS CSCD 北大核心 2002年第10期1450-1454,共5页 Acta Electronica Sinica
基金 国家自然科学基金 (No .699730 32 )
关键词 安全协议 时限责任 形式化分析 Kudo逻辑 temporal accountability formal analysis Kudo logic
  • 相关文献

参考文献10

  • 1Burrows M,Abadi M,Needham R M.A logic of authentication.Report.39[R].Palo Alto,CA:DEC System Research Center,1989.
  • 2Subramanian S.Design and verification of secure e-commerce protocols[D].USA:The Ohio State University,1998.
  • 3Denning D E,Sacco G M.Timestamps in key distribution protocols[J].Comm.of ACM,1981,24(8):533-536.
  • 4Syverson P.Adding time to a logic of authentication[A].In Proc.of the 1st ACM Conf.on Computer and Communications Security[C].Fairfax:ACM,1993.97-101.
  • 5Abadi M,Tuttle M R.A semantics for a logic of authentication[A].Proc.of the 10th Annual ACM Symposium on Principles of Distributed Computing[C].1991.201-216.
  • 6Stubblebine S G,Wright R N.An authentication logic supporting synchronization,revocation,and recency[A].Proc.of the 3rd ACM Conf.on Computer and Communications Security[C].New Delhi:ACM,1996.95-105.
  • 7Kailar R.Accountability in electronic commerce protocols[J].IEEE Trans.on Software Engineering,1996,22(5):313-328.
  • 8Kudo M.Electronic submission protocol based on temporal accountability[A].Proc.of 14th Annual Computer Security Application Conf.[C].Phoenix:ACSA,1998.353-363.
  • 9Sirbu M,Tygar J D.NetBill:an internet commerce system optimized for network delivered services[J].IEEE Personal Communications,1995,2(4):34-39.
  • 10Yee B,Tygar J D.Secure coprocessors in electronic commerce applications[A].Proc.of the 1st USENIX Workshop on Electronic Commerce[C].New York:USENIX,1995.155-170.

同被引文献82

引证文献6

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部