期刊文献+

一个安全协议度量方法及其应用 被引量:1

Measure method of security protocol and its applications
在线阅读 下载PDF
导出
摘要 简要说明了对安全协议进行协议度量和冗余度量的一个基于模态逻辑方法,形式化地给出了协议对安全目标满足度的度量方法定义, 并讨论了相应的协议冗余分析和化简方法。给出了对安全协议的内容进行逻辑比较的准则,结合实例分析了两个协议之间的逻辑包含关系。讨论结合逆向推理的两个应用:对基于模态逻辑的协议分析中隐含假设的分析方法,协议设计和生成方法。 A modal logic based method for security protocol measurement and redundancy measurement is introduced. The definition ofprotocolsecurity goal satisfaction measurement is given formally, aswellasthe analyzing and reducing method of protocol redundancy. Based on this, logical comparison of two protocol is available which is applied in an instantiated analysis of the logical covering rela- tionship between two protocols. Two applications of the method both using reverse inference are proposed: Analysis method of implicit assumptions involved in modal logic-based protocol analysis, and protocol design and generation.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第3期644-647,650,共5页 Computer Engineering and Design
基金 广州市科委重点科技攻关基金项目(B2-109-550)
关键词 安全协议 协议分析 逆向推理 冗余度 满足度 模态逻辑 协议设计 度量方法 法定 准则 security protocol protocol measurement protocol redundancy protocol generation protocol design modal logic reverse inference
  • 相关文献

参考文献17

  • 1周典萃,卿斯汉,周展飞.Kailar逻辑的缺陷[J].软件学报,1999,10(12):1238-1245. 被引量:29
  • 2卿斯汉.一种新型的非否认协议[J].软件学报,2000,11(10):1338-1343. 被引量:21
  • 3周典萃,卿斯汉,周展飞.一种分析电子商务协议的新工具[J].软件学报,2001,12(9):1318-1328. 被引量:47
  • 4Burrows M, Abadi M, Needham R. A logic of authentication[C].Proceedings of the royal society of London, 1989. 233-271.
  • 5Syverson PF, Van Oorschot PC. On unifying some cryptographic protocol logics [C]. Proceedings of the 1994 IEEE computer society symposium on research in security and privacy, Los Alamitos: IEEE Computer Society Press, 1994. 14-28.
  • 6Roscoe A, Goldsmith M. The perfect 'spy' for model-checking cryptoprotocols[C]. DIMACS workshop on design and formal verification of security protocols, 1997.
  • 7Mitchell J, Mitchell M, Stern U. Automated analysis of cryptographic protocols using murphi[A]. Proceedings of the 1997 IEEE computer society symposium on research in security and privacy[C]. Los Alamitos: IEEE Computer Society Press, 1997.141-151.
  • 8Thayer FJ, Herzog JC, Guttman JD. Strand spaces:Why is a security protocol correct[A].Proceedings of the 1998 IEEE symposium on security and privacy[C]. Los Alamitos: IEEE Computer Society Press, 1998. 160-171.
  • 9Leduc G, Germeau F. Verification of security protocols using LOTOS-method and application[J]. Computer Communications,2000, 23(12):1089-1103.
  • 10Millen JK. CAPSL:Common authentication protocol specification language [R]. Technical Report: MP 97B48, The MITRE Corporation, 1997.

二级参考文献5

  • 1卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 2沈延生.对村民自治的期望与批评[A]..中国农村研究(2002年卷)[C].北京:中国社会科学出版社,2003..
  • 3Zhou J,Proc ’96 IEEE Sympo Security and Privacy,1996年,55页
  • 4Deng R H,J Network System Management,1996年,4卷,3期,279页
  • 5周典萃,卿斯汉,周展飞.Kailar逻辑的缺陷[J].软件学报,1999,10(12):1238-1245. 被引量:29

共引文献76

同被引文献6

  • 1王涛,郭荷清,姚松涛.一个基于模态逻辑的安全协议度量方法[J].华南理工大学学报(自然科学版),2004,32(11):37-42. 被引量:1
  • 2WANG Tao, GUO He -qing, YAO Song- tao. A measure and design method of security protocol[ C ] //GUO Qingpin. Proceeding of 2004 International Symposium on Distributed Computing and Applications to Business, Engineering and Science, DCABES04. Wuhan : Hubei Science and Technology Press, 2004:964 - 970.
  • 3ISO/IEC CD 1388822. Non - Repudiation, Part 2: Using Symmetric Encipherment Algorithms[S].
  • 4FRIEDMAN E J. JESS, The Java Expert System Shell[R]. Pittsburgh: Sandia National Library, 1997.
  • 5THAYER F J, HERZOG J C,GUTTMAN J D. Strand spaces: proving security protocols correct[J]. Journal of Computer Security, 1999,7 (2 - 3) : 191 - 230.
  • 6卿斯汉.并行密码体制的构造[J].软件学报,2000,11(10):1286-1293. 被引量:6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部