中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 会议论文
题名:
some improvements on model checking coreasm models of security protocols
作者: Zhao Zhenju ; Liu Feng ; Peng Jianhua ; Huang Danqing ; Xue Rui ; Zhang Zhenfeng
会议文集: Proceedings - 2nd International Symposium on Data, Privacy, and E-Commerce, ISDPE 2010
会议名称: 2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010
会议日期: September
出版日期: 2010
会议地点: Buffalo, NY, United states
关键词: Abstracting ; Computation theory ; Contour followers ; Data privacy ; Electronic commerce ; Model checking ; Network protocols ; Trees (mathematics)
出版地: United States
收录类别: EI
ISBN: 9780770000000
部门归属: (1) State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China; (2) Graduate University of the Chinese Academy of Sciences, Beijing 100190, China
主办者: University of Buffalo (UB); The State University of New York
英文摘要: This paper presents a tool called ASM-SPV (Abstract State Machines-Security Protocols Verifier) for verifying security protocols by model checking. In ASM-SPV, a security protocol is modeled by CoreASM language which is an executable ASM (Abstract State Machines) language. Then a modified CoreASM engine takes the CoreASM model of the protocol to build state space on-demand. Furthermore, security properties of the protocol are described as CTL (Computation Tree Logic) formulas and an adapted model checking algorithm is introduced to check whether the CoreASM model satisfies a given CTL formula or not. In this paper, we show the effectiveness of ASM-SPV with regard to memory consumption and speed of generating states compared with another CoreASM based model checker [mc]square. © 2010 IEEE.
内容类型: 会议论文
URI标识: http://ir.iscas.ac.cn/handle/311060/8910
Appears in Collections:信息安全国家重点实验室_会议论文

Files in This Item:
File Name/ File Size Content Type Version Access License
05636244.pdf(216KB)----限制开放-- 联系获取全文

Recommended Citation:
Zhao Zhenju,Liu Feng,Peng Jianhua,et al. some improvements on model checking coreasm models of security protocols[C]. 见:2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010. Buffalo, NY, United states. September.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Zhao Zhenju]'s Articles
[Liu Feng]'s Articles
[Peng Jianhua]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Zhao Zhenju]‘s Articles
[Liu Feng]‘s Articles
[Peng Jianhua]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace