期刊文献+

基于ProVerif的电子商务协议分析 被引量:4

Analysis for e-commerce protocols based on ProVerif
下载PDF
导出
摘要 采用应用pi演算来建模自动解决争端的公平电子商务协议,基于一致性给出了公平性的形式描述方法,利用应用pi演算的自动化分析工具——ProVerif分析了该协议,结果表明,利用一致性描述协议公平性是可行的,同时指出了基于ProVerif验证电子商务协议的优缺点:适用于分析"A事件发生以前,B事件是否曾经发生",但不适用于分析"A事件发生之后,B事件将来是否会必然(或可能)发生"。 It was very important to analyze e-commerce protocols by formal methods. A technique for modeling the fair-change e-commerce protocol (FEEP) with automated dispute resolution and for verifying its property was proposed. First, FEEP was modeled in applied pi-calculus and a novel formalization of the fairness was provided in term of a correspondence property. Then, ProVerif, proposed by Juels, Catalano and Jakobsson, was adopted to analyze FEEP automatically. The results show that:it is feasible to formalize the fairness based on a correspondence property; ProVerif can be used to verify the property that before event A happened, event B had happened, but it is not applicable to analyze the property that after event A happened, event B would happen.
出处 《通信学报》 EI CSCD 北大核心 2009年第3期125-129,共5页 Journal on Communications
基金 国家重点基础研究发展计划(“973”计划)基金资助项目(2007CB311100) 国家高技术研究发展计划(“863”计划)基金资助项目(2007AA01Z446) 国家自然科学基金资助项目(60703021,60873217)~~
关键词 电子商务协议 公平性 ProVerif e-commerce protocol fairness ProVerif
  • 相关文献

参考文献14

  • 1卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:117
  • 2BURROWS M, ABADI M, NEEDHAM R. A logic of authentication[J]. ACM Transactions on Computer Systems,1990,8(1):18-36.
  • 3KAILAR R. Accountability in electronic commerce protocol[J]. IEEE Transactions on software Engineering, 1996,22(5): 313-328.
  • 4LOWE G. Breaking and fixing the needham-schroeder public-key protocol using FDR[A]. Proceedings of Tools and Algorithms for the Construction and Analysis of Systems (TACAS) [C]. 1996.147-166.
  • 5PAULSON L C.Proving properties of security protocols by induction[A]. Proceedings of the 10th Computer Security Foundation Workshop[C]. 1997. 70-83.
  • 6JAVlER F, FABREGA T, CHERZOG J, et al. Strand space: proving security protocols correct[J]. Journal of Computer Security, 1999, 7:191-230.
  • 7BLANCHET B. A computationally sound mechanized prover for security protocols[C]. Proceedings of the 27th IEEE Symposium on Security & Privacy, 2006.140-154.
  • 8BHARGAVAN K, FOURNET C, GORDON A, et al. Verified implementations of the information card federated identity-management protocol[A]. Proceedings of ACM Symposium on Information, Computer and Communications Security[C]. 2008.123-135.
  • 9ABADI M, BLANCHET B, FOURNET C. Just fast keying in the pi calculus[J]. ACM Transactions on Information and System Security (TISSEC), 2007, 10(3):1-59.
  • 10ABADI M, BLANCHET B, FOURNET C. Just fast keying in the pi calculus[J]. ACM Transactions on Information and System Security (TISSEC), 2007, 10(3):1-59.

二级参考文献6

共引文献116

同被引文献42

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部