期刊文献+

安全协议中的形式化验证技术 被引量:1

Formal Verification Techniques for Security Protocols
在线阅读 下载PDF
导出
摘要 伴随着网络和通信的迅速发展,安全已经成为一个备受关注的问题,为确保不同系统的安全,出现了许多的安全协议。文中描述了安全协议验证的形式化需求,并且详细阐述了目前流行的几种形式化的验证技术及各自的优缺点,探讨了形式化验证技术所面临的挑战,指出目前在这方面所做的工作以及有待发展的方向。 Rapid development of networks and communications make security a more crucial problem. To provide security for different systems many communication security protocols are proposed.In this paper,illustrate the formal verific ation requirement for security protocols, also describe several formal verification techniques and set forth the relative merit of each in detail.And the challenges with which formal verification techniques faced are discussed .The researches on these aspects and directions of development are presented.
出处 《微机发展》 2003年第11期112-114,124,共4页 Microcomputer Development
关键词 安全协议 形式化验证技术 网络协议 计算机网络 security protocol formal verification technique BAN logic state enumeration theorem proving
  • 相关文献

参考文献12

二级参考文献68

  • 1王兵山 等.离散数学[M].长沙:国防科技大学出版社,1995..
  • 2[1]Michael Burrows,Martin Abadi,Roger Needham. A logic of Authentication[J].ACM Transactions in Computer Systems, 1990
  • 3[2]Martin Abadi,Mark Tuttle. A Semantics for Logic of Authentication[C].In:Proceedings of the Tenth ACM Symposium on Principles of Distributed Computing,ACM Press,1991
  • 4[3]Paul F Syverson.Adding Time to a Logic of Authentication[C].In:Proceedings of the First ACM Conference on Computer and Communications Security,ACM Press, 1993
  • 5[4]Paul Syverson,Catherine Meadows. Formal Requirements for Key Distribution Protocols[C].In:Proceedings of Eurocrypt'94,Springer-Verlag,1994
  • 6[5]Catherine Meadows. The NRL Protocol Analyzer:An Overview[C].In:Proceedings of the Second International Conference on the Practical Application of Prolog, 1994
  • 7[6]Gavin Lowe. Breaking and fixing the Needham-Schroeder Public-Key Protocol using CSP and FDR[C].In:Proceedings of TACAS,Springer-Verlag, 1996
  • 8[7]Paul F Syverson. Knowledge , Belief, and Semantics in the Analysis of Cryptographic Protocol[J].Journal of Computer Security, 1992
  • 9[8]C Meadows. A Model of Computation for the NRL Protocol Analyzer [C].In:Proceedings of Computer Security Foundations Workshop Ⅶ IEEE Computer Society Press, 1994
  • 10[9]A Cimatti,E Clarke. NuSMV:a new Symbolic Model Verifier. 1998.URL:http://sra.itc.it/tools/NuSMV

共引文献5

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部