期刊文献+

安全属性形式化描述统一框架及其分析方法研究

Study of unified framework of security properties and their analysis method
下载PDF
导出
摘要 在安全协议的形式化分析研究当中,如何在统一的框架下对更多的安全属性进行分析和验证是一个亟待解决的重要问题。为了解决这个问题,提出了用匹配关系来形式化地描述各种安全属性的统一框架,建立了语法和语义系统,并证明了该框架的可靠性和完备性。在此基础上,将知识推理和进程演算结合起来,提出了一个安全协议形式化分析的一般模型。最后,给出了一些安全属性的研究实例,并指出了进一步完善此模型的研究方向。 In the study of the formal analysis of security protocols,it is desiderated to analysis more security properties under a unified framework.This paper presented a unified framework to formally depiction the security properties based on matching relations.Built up the syntax and the corresponding semantic of this unified framework,and also verified its soundness and completeness.Based on this framework,combining the process calculus with knowledge derivation,presented a generic model for the analysis of security protocols.Using this model and unified framework,analyzed some security properties as case study.Also pointed out some future directions at the end.
出处 《计算机应用研究》 CSCD 北大核心 2011年第4期1460-1464,共5页 Application Research of Computers
基金 国家"863"计划863-104-03-01课题资助项目
关键词 进程演算 知识推理 安全属性 形式化分析 安全协议 process calculus knowledge derivation security properties formal analysis security protocol
  • 相关文献

参考文献13

  • 1MEADOWS C. Formal methods for cryptographic protocol anaIysis: e- merging issues and trends[J]. IEEE Joumal on Selected Areas in Communications ,2003,21 ( 1 ) :44-54. 被引量:1
  • 2卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:118
  • 3GUTFMAN J D, THAYER F J, CARLSON J A, et al. Trust management in strand spaces : a rely-guarantee method [ C ]//Proc of the 13th European Symposium on Programming. 2004:325- 339. 被引量:1
  • 4RYAN P Y A, SCHNEIDER S A, GOLDSMITH M H, et al. The modeling and analysis of security protocols: the CSP approach[ M]. London: Pearson, 2001. 被引量:1
  • 5HAACK C, JEFFREY A. Timed spi-ealculus with types for secrecy and authenticity [ C ]//LNCS, vol 3653. [ S.L ] : Springer-Verlag, 2005 : 202- 216. 被引量:1
  • 6BOREALE M. Symbolic trace analysis of cryptogTaphic protocols [ C ]//Proc of the 28th International Colloquium on Automata, Language and Programming. London: Springer-Verlag, 2001:667-681. 被引量:1
  • 7顾永跟,傅育熙.基于进程演算和知识推理的安全协议形式化分析[J].计算机研究与发展,2006,43(5):953-958. 被引量:7
  • 8DAqq?A A, DEREK A, MITCHELL J C, et al. Protocol composition logic (PCL) [ J]. Electronic Notes in Theoretical Computer Science,2007,172:311 - 358. 被引量:1
  • 9WOO T Y C, LAM S S. A semantic model for authentication protocols [ C]//Proc of the 14th ]EEE Symposium on Research in Security and Privacy. Los A|amitos, CA: IEEE Computer Society,1993 : 178-194. 被引量:1
  • 10DOLEV D, YAO A. On the security of public key protocols[J]. IEEE Trans on Information Theory, 1983,29(2) :198-208. 被引量:1

二级参考文献16

  • 1李梦君,李舟军,陈火旺.基于进程代数安全协议验证的研究综述[J].计算机研究与发展,2004,41(7):1097-1103. 被引量:25
  • 2卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 3C.Meadows.Formal methods for cryptographic protocol analysis:Emerging issues and trends.IEEE Journal Onselected Areas in Communications,2003,21(1):44~54 被引量:1
  • 4薛锐.安全协议的形式化分析技术和方法.安全协议研讨会,北京,2004. 被引量:3
  • 5M.Burrows,M.Abadi,R.Needham.A logic of authentication.ACM Transactions on Computer Systems,1990,8(1):18~ 36 被引量:1
  • 6D.Dolev,A.Yao.On the security of public key protocols.IEEE Trans on Information Theory,1983,29(2):198~208 被引量:1
  • 7M.Abadi,A.D.Gordon.A calculus for cryptographic protocols:The spi calculus.The 4th ACM Conf on Computer and Communications Security,Zurich,Switzerland,1997 被引量:1
  • 8T.Y.C.Woo,S.S.Lam.A semantic model for authentication protocols.In:Proc.14th IEEE Symposium on Research in Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,1993.178~194 被引量:1
  • 9J.Zhou,D.Gollmann.Towards verification of non-repudiation protocols.1998 International Refinement Workshop and FormalMethods Pacific,Canberra,Australia,1998 被引量:1
  • 10P.Y.A.Ryan,S.A.Schneider,M.H.Goldsmith,et al.The Modeling and Analysis of Security Protocols:The CSP Approach.Londdon,England:Pearson,2001 被引量:1

共引文献121

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部