期刊文献+

网络支付协议的形式化安全需求及验证逻辑 被引量:2

A logic for the formal requirements and verification of network payment protocols
下载PDF
导出
摘要 从整个网络支付协议的安全角度出发,提出网络支付协议的多层安全需求模型,包括以认证和密钥分配为基础的基层需求、网络支付协议固有的中层需求(包括保密性、原子性、公平性、完整性、匿名性、不可否认性、可追究性等)、以及面向具体应用的高层需求。基于一阶逻辑和时序逻辑,提出一种适合描述网络支付协议的形式化安全需求的逻辑,描述了该逻辑的语法结构和推理规则,并用该安全需求逻辑对网络支付协议的多层安全需求进行了形式化描述。最后,以SET协议为例进行需求验证。 From the point of the security of the whole network payment protocols, a framework of the hierarchy security requirements was illustrated, which includes the base requirements based on authentication and key distribution, the middle requirements (such as security, atomicity, fairness, integrity, anonymity, non-repudiation, accountability), and the upper requirements faced on special applications. Based on first-order logic and temporal logic, a logic suitable for specifying the formal requirements for network payment protocols was presented, as well as its grammar and inference rules. Using this logic, the formal hierarchy requirements for network payment protocols were described. As an example, the formal requirements of the SET protocol was verified using this logic.
出处 《通信学报》 EI CSCD 北大核心 2004年第4期174-182,共9页 Journal on Communications
基金 国家"863"高科技发展计划基金资助项目(863-306-ZT05-05-6)
关键词 电子商务协议 形式化验证 安全性 原子性 公平性 匿名性 可追究性 electronic commerce protocol formal verification security atomicity fairness anonymity accountability
  • 相关文献

参考文献12

  • 1NEUMAN B, MEDVINSKY G. Requirements for network payment: the NetCheque perspective[A]. Proceedings of IEEE COMPCON'95[C]. San Francisco, 1995.32-37.
  • 2BOLIGNANO D. Towards the formal verification of electronic commerce protocol[A]. Proceedings of the 10th IEEE Computer Security Foundations Workshop[C]. Rockport, Massachusetts, USA, 1997. 133-146.
  • 3BRACKIN S. Automatic formal analyses of two large commercial protocols[A]. DIMACS Workshop on Design and Formal Verification of Security Protocols[C]. Rutgers university, Piscataway, New Jersey, 1997.
  • 4何成 王尚平 王育民.安全协议逻辑分析语言的研究[J].信息工程大学学报,2001,2:13-19.
  • 5MEADOWS C, SYVERSON P. A formal specification of requirements for payment transactions in the SET protocol[A]. Proceedings of Financial Cryptography'98[C]. Anguilla, British West Indies, 1998.
  • 6刘怡文,李伟琴.密码协议的分层安全需求及验证[J].北京航空航天大学学报,2002,28(5):589-592. 被引量:5
  • 7TYGAR J D. Atomicity in electronic commerce[A]. Proceedings of 15th Annual ACM Symposium on Principles of Distributed Computing[C]. New York, 1996. 8-26.
  • 8ASOKAN N. Fairness in electronic commerce[D]. Department of Mathematics, University of Waterloo, Canada, 1998.
  • 9REITER M, RUBIN A. Crowds: anonymity for web transactions[J]. ACM Transactions on Information and System Security, 1998,1(1):66-92.
  • 10LIU Yi-wen, LI Wei-qin. The model reasoning verifier for cryptographic protocols[A]. Proceedings of the Sixth International Conference for Young Computer Scientist[C]. Hangzhou, China, 2001.290-295.

二级参考文献6

  • 1[1]Roscoe A W. Intensional specifications of security protocols[A]. In: Guttman J, ed. Proceedings of 9th IEEE Computer Security Foundations Workshop[C]. Los Alamitos: IEEE Computer Society, 1996. 28~38.
  • 2[2]Boyd C. Towards extensional goals in authentication protocols[J/OL].http://dimacs.rutgers.edu/workshops/security/program2/program.html,1997.
  • 3[3]Paulson L C. The inductive approach to verifying cryptographic protocols[J]. Journal of Computer Security, 1998, 6(1/2): 85~128.
  • 4[4]Abadi M, Tuttle M R. A semantics for logic of authentication[A]. In: Proceedings of the 10th ACM Symposium on Principles of Distributed Computing[C]. New York: ACM Press, 1991. 201~216.
  • 5[5]Meadows C. A model of computation for the NRL protocol analyzer[A]. In: Gong L, ed. Proceedings of Computer Security Foundations Workshop VII[C].Los Alamitos: IEEE Computer Society Press, 1994. 84~89.
  • 6[6]Syverson P F. Adding time to a logic of authentication[A]. In: Sandhu R, ed. Proceedings of the First ACM Conference on Computer and Communications Security[C]. New York: ACM Press, 1993. 97~101.

共引文献4

同被引文献40

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部