首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Towards the Idealization Procedure of BAN-Like Logics
作者姓名:CAOLi-li  CHENKe-fei
作者单位:DepartmentofComputerScienceandEngineering,ShanghaiJiaotongUniversity,Shanghai200030,China
基金项目:SupportedbytheNationalNaturalScienceFoundationofChina(90104005,60273049)
摘    要:We demonstrate the flaws of Mao‘s method, which is an augmentation of protocol idealization in BAN-like logics, and then offer some new idealization rules based on Mao‘s method. Furthermore, we give some theoretical analysis of our rules using the strand space formalism, and show the soundness of our idealization rules under strand spaces. Some examples on using the new rules to analyze security protocols are also concerned. Our idealization method is more effective than Mao‘s method towards many protocol instances, and is supported by a formal model.

关 键 词:安全协议  BAN逻辑  理想程序  计算机安全
收稿时间:28 May 2004

Towards the idealization procedure of BAN-like logics
CAOLi-li CHENKe-fei.Towards the Idealization Procedure of BAN-Like Logics[J].Wuhan University Journal of Natural Sciences,2005,10(1):214-218.
Authors:Cao Li-li  Chen Ke-fei
Institution:(1) Department of Computer Science and Engineering, Shanghai Jiaotong University, 20030 Shanghai, China
Abstract:We demonstrate the flaws of Mao's method, which is an augmentation of protocol idealization in BAN-like logics, and then offer some new idealization rules based on Mao's method. Furthermore, we give some theoretical analysis of our rules using the strand space formalism, and show the soundness of our idealization rules under strand spaces. Some examples on using the new rules to analyze security protocols are also concerned. Our idealization method is more effective than Mao's method towards many protocol instances, and is supported by a formal model. Foundation item: Supported by the National Natural Science Foundation of China (90104005, 60273049) Biography: CAO Li-li (1980-), male, Master candidate, research direction: formal analysis of security protocols.
Keywords:security protocols  BAN logic  idealization  strand spaces
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号