期刊文献+

安全协议验证的归纳方法与串空间形式化比较 被引量:1

Compairing the Inductive Method and Strand Spaces for Security Protocol Verification
下载PDF
导出
摘要 使用归纳方法和串空间分别将NSL(Needham-Schroeder-Lowe)协议及其正确性在辅助证明系统Agda中形式化,并比较了这两种安全协议验证法,证明两种方法形式化的正确性和攻击者能力是相同的. Compared in this paper are the inductive method and strand spaces for security protocol verification. This is done by formalising the NSL (Needham-Schroeder-Lowe) protocol and its correctness in Agda, an interactive proof editor, using both the inductive method and strand spaces in Agda. The two formalisations in Agda are compared and it is shown that they formalise the same notion of the correctness of the protocol and the same penetrator's ability.
作者 乔海燕
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第z1期137-142,共6页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60673050)
关键词 安全协议验证 归纳方法 串空间 类型论 cryptographic protocol inductive method strand space type theory
  • 相关文献

参考文献9

  • 1[1]Gavin Lowe.Breaking and fixing the Needham-schroeder public-key protocol using FDR.In:Tools and Algorithms for the Construction and Analysis of Systems(TACAS).Berlin:Springer-Verlag,1996.147-166 被引量:1
  • 2卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:117
  • 3[3]Danny Dolev,Andrew C Yao.On the security of public key protocols.IEEE Trans on Information Theory,1983,29(2):198-208 被引量:1
  • 4[4]F Javier Thayer Fábrega,Jonathan C Herzog,Joshua D Guttman.Strand spaces:Proving security protocols correct.Journal of Computer Security,1999,7(2-3):191-230 被引量:1
  • 5[5]Lawrence C Paulson.The inductive approach to verifying cryptographic protocols.Journal of Computer Security,1998,6(2):85-128 被引量:1
  • 6[6]MITRE.The Strand Space Method.http://www.mitre.org/tech/strands/,2001 被引量:1
  • 7[7]L Paulson.Theory NS Public.http://www.cl.cam.ac.uk/Research/HVG/Isabelle/dist/library/HOL/Auth/NS Public.html,1998 被引量:1
  • 8[8]C Coquand,T Coquand.Structured type theory.Workshop on Logical Frameworks and Meta-Languages (LFM'99),Paris,1999 被引量:1
  • 9[9]Catarina Coquand.The Agda homepage.http://www.cs.chalmers.se/~catarina/agda,1998 被引量:1

二级参考文献6

共引文献116

同被引文献21

  • 1吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 2刘万伟,周倜,李梦君,李舟军.一种基于进程代数的安全协议验证消解算法[J].计算机工程与科学,2006,28(7):14-16. 被引量:1
  • 3Patrick Hner. Cloud Computing Security Requirements and Solutions: a Systematic Literature Review[C]. 19^th Twente Student Conference on IT, 2013. 被引量:1
  • 4R. La 'Quata Sumter. Cloud Computing: Security Risk Classification, ACMSE 2010, Oxford, USA. 被引量:1
  • 5何小虎.基于云计算的安全协议分析与设计[D].成都电子科技大学,2012. 被引量:1
  • 6王剑.移动终端可信接入与验证[D].同济大学,2011. 被引量:1
  • 7Grawrock D. TCG Specification Architecture Overview Revision 1.4.[EB/OL].[2011-05-01]. https://www. trustedcomputionggroup.org/groups/TCG 1.4 Archiecture Overview.pdf. 被引量:1
  • 8Shuching Wang, Wenpin Liao, Kuoqin Yan,et al. Security of cloud computing lightweight authentication protocol [J].Applied Mechanics and Materials, 2013, 284-287: 3502-3506. 被引量:1
  • 9R. Rajagopal, M. Chitra. Trust Based Interoperability Security Protocol for Grid and Cloud Computing[C].2012 3rd International Conference on Computing, Communication and Networking Technologies, 2012. 被引量:1
  • 10Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank Namdev, et al.Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment[C]. 2012 CSI 6th International Conference on Software Engineering, 2012. 被引量:1

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部