期刊文献+

一种电子商务协议原子性的模型检验分析方法 被引量:2

Model Checking Analysis for Atomicity of Electronic Commerce Protocol
在线阅读 下载PDF
导出
摘要 提出了一个分析电子商务协议的形式化模型,介绍了基于该模型的电子商务协议原子性的描述方法。同其他模型相比,该模型能较好地分析具有多个实例并发运行时电子商务协议的原子性。最后基于该模型,用符号模型检验工具(SMV)分析了Digicash协议和Netbill协议。 A simple model for modeling electronic commerce protocol is proposed and a novel technique for formally describing its atomicity is presented. The model can be used to analyze atomicity and adapted to meet the situation that more than one instances of protocols run concurrently. Taking the protocols Digicash and Netbill as the exam- ples, the paper presents the method how to implement the model based on the symbolic model verifier-SMV.
出处 《计算机科学》 CSCD 北大核心 2005年第4期184-186,共3页 Computer Science
基金 广西自然科学基金项目(桂科字0229051)的资助
关键词 电子商务协议 原子性 检验分析 形式化模型 描述方法 检验工具 符号模型 Electronic commerce protocol Model checking Atomicity
  • 相关文献

参考文献14

  • 1Gritzalis S, Spinellis D,Georgiadis P. Security Protocols over Open Networks and Distributed Systems ,formal Method for their Analysis ,Design and Verification. Computer Communications, 1999,22(8):695~707
  • 2Kailar R. Accountability in Electronic Commerce Protocols. IEEE Trans. on Software Engineering, 1996,22 (5): 313~328
  • 3Marrero W,Clarke E,Jha S. Model checking for security protocols: [Carnegie Mellon University: Technical Report CMU-SCS97-139]. 1997
  • 4Paulson L C. The Inductive Approach to Verifying Cryptographic protocols. Journal of Computer Securitv, 1998. 85~128
  • 5周典萃,卿斯汉,周展飞.Kailar逻辑的缺陷[J].软件学报,1999,10(12):1238-1245. 被引量:29
  • 6Boyd C, Mao W. On a limitation of BAN logic. In: Proc. of EUROCRYPT'93 Lecture Notes in Computer Science,SpringerVerlag, 1993. 240~247
  • 7Heintze N,Tygar J D, Wing J, Wong H C. Model Checking Electronic Commerce Protocols. In:Proc. M the 2nd USENIX Workshop on Electronic Commerce, 1996.147~ 164
  • 8Tygar J D. Atomicity in elect ronic commerce. In:Proc. of the 15th Annual ACM Symposium on Principles of Distributed Computing, 1996.8~26
  • 9周典萃,卿斯汉,周展飞.一种分析电子商务协议的新工具[J].软件学报,2001,12(9):1318-1328. 被引量:47
  • 10郭云川,古天龙,董荣胜,蔡国永.电子商务协议形式化分析的一种新方法[J].计算机科学,2004,31(8):86-88. 被引量:1

二级参考文献23

  • 1[1]Gritzalis S,Spinellis D. Georgiadis P. Security Protocols over Open Networks and Distributed Systems: Formal Method for Their Analysis, Design and Verification. Computer Communications,1999,22(8) :695~707
  • 2[2]Burrows M, Abadi M, Needham R. A Logic of Authentication.ACM Transactions on Computer Systems, 1990,8 (1): 18~36
  • 3[3]Papa M,Bremer O,Hale J,Shenoi S. Formal Analysis of E-Commerce Protocols. In: Proc. of the 5th Intl. Symposium on Autonomous Decentralized Systems, Vol. E84-D,2001.19~28
  • 4[4]Abadi M, Gordon. Reasoning about Cryptographic Protocols in the Spi Calculus. CONCUR'97: Concurrency Theory, 1997,1243:59~73
  • 5[5]Tygar J D. Atomicity in Electronic Commerce. In:Proc. of the 15th Annual ACM Symposium on Principles of Distributed Computing. 1996.8~26
  • 6[6]Zhou Jian-ying, Gollman D. A Fair Non-repudiation Protocol. In:Proc. of the 1996 IEEE Symposium on Security and Privacy. 1996.55~61
  • 7[7]O'Toole K R. The Internet Billing Server Transaction Protocol Alternatives. INITR-1, Carnegie Mellon University, Information Networking Institute. 1994,4
  • 8沈延生.对村民自治的期望与批评[A]..中国农村研究(2002年卷)[C].北京:中国社会科学出版社,2003..
  • 9Zhou J,Proc ’96 IEEE Sympo Security and Privacy,1996年,55页
  • 10Deng R H,J Network System Management,1996年,4卷,3期,279页

共引文献66

同被引文献15

  • 1张峰庆,张微晴,张艳庆.J2EE平台上基于Web服务企业应用集成的研究[J].计算机工程与应用,2005,41(5):144-146. 被引量:16
  • 2王凤霞,张景,常晓.电子教务门户研究与设计[J].计算机工程,2005,31(8):227-229. 被引量:2
  • 3Zhou J, Gollmann D. A fair non-repudiation protocol. In: IEEE Computer Society Symposium on Research in Security and Privacy, 1996. 55~61.
  • 4Zhou J, Gollmann D. Towards verification of non-repudiation protocols. In: Proc. of 1998 Intl. Refinement Workshop and Formal Methods Pacific, 1998. 370~380.
  • 5Schneider S. Verifying authentication protocols with CSP. In:IEEE Computer Security Foundations Workshop, IEEE, 1997.
  • 6Sigrid , Rudolph C. Security Analysis of (Un-) Fair Non-repudiation Protocols. In: Formal Aspects of Security ( FASec' 02 )Springer Verlag, LNCS, 2002, 2629:97~114.
  • 7Maggi P, Sisto R. Using SPIN to Verify Security Properties of Cryptographic Protocols. In: SPIN'2002 Workshop, 2002.
  • 8Petropoulos D, Kotzanikolaou P. Some more improvements on a fair non-repudiation protocol. Journal of Internet Technology,2002, 4(4).
  • 9Kim K,Park ,Baek J. Improving Fairness and Privacy of ZhouGollmann's Fair Non-repudiation Protocol. In: Proc. of ICPP Workshop on Security(IWSEC), IEEE Computer Society, 1999.140~145.
  • 10Kremer S, Markowitch O,Zhou Jianying. An intensive survey of non-repudiation protocols. Computer Communications, 2002, 25(17): 1606~1621.

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部