Kao Chow加密协议是由Kao和Chow提出的,他们利用BAN逻辑证明了该协议的认证性,但没有证明该协议的保密性,而且没有说明协议参与实体间得到的新会话密钥是否一致.事实上,由于BAN逻辑自身的缺陷,它无法用于证明加密协议的保密性.基于此,...Kao Chow加密协议是由Kao和Chow提出的,他们利用BAN逻辑证明了该协议的认证性,但没有证明该协议的保密性,而且没有说明协议参与实体间得到的新会话密钥是否一致.事实上,由于BAN逻辑自身的缺陷,它无法用于证明加密协议的保密性.基于此,给出了Kao Chow加密协议的串空间模型,这个模型不仅验证了该协议的认证性,还验证了它的保密性及新会话密钥的一致性.展开更多
Wigmore’s charts and Bayesian networks are used to represent graphically the construction of arguments and to evaluate them. KAOS is a goal oriented requirements analysis method that enables the analysts to capture r...Wigmore’s charts and Bayesian networks are used to represent graphically the construction of arguments and to evaluate them. KAOS is a goal oriented requirements analysis method that enables the analysts to capture requirements through the realization of the business goals. However, KAOS does not have inbuilt mechanism for evaluating these goals and the inferring process. This paper proposes a method for evaluating KAOS models through the extension of Wigmore’s model with features of Bayesian networks.展开更多
文摘Wigmore’s charts and Bayesian networks are used to represent graphically the construction of arguments and to evaluate them. KAOS is a goal oriented requirements analysis method that enables the analysts to capture requirements through the realization of the business goals. However, KAOS does not have inbuilt mechanism for evaluating these goals and the inferring process. This paper proposes a method for evaluating KAOS models through the extension of Wigmore’s model with features of Bayesian networks.