• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Huanbao, Zhang Yousheng, and Li Yuan. A Diagram of Strand Spaces for Security Protocols[J]. Journal of Computer Research and Development, 2006, 43(12): 2062-2068.
Citation: Wang Huanbao, Zhang Yousheng, and Li Yuan. A Diagram of Strand Spaces for Security Protocols[J]. Journal of Computer Research and Development, 2006, 43(12): 2062-2068.

A Diagram of Strand Spaces for Security Protocols

More Information
  • Published Date: December 14, 2006
  • The strand space model illustrated with the diagram of strand spaces is adopted as a formalism of security protocols. The open bundle is defined, which is only one element for composing diagrams of strand spaces. And the two operators such as prefixing and parallel composition over the set of open bundles are defined. A novel method is proposed to generate diagrams of strand spaces of security protocols that run in an infinite concurrent way through operating of prefixing and parallel composition between open bundles. The bi-simulation equivalence relation between diagrams of strand spaces based on the bi-simulation between open bundles is defined. Reduction rules for eliminating redundancies of diagrams of strand spaces are also proposed. The case analysis and the comparison between this work and other related work show that the diagram of strand spaces can be used as an effective model for proving security properties of cryptographic protocols that run in an infinite concurrent way.
  • Related Articles

    [1]Fu Liguo, Pang Jianmin, Wang Jun, Zhang Jiahao, Yue Feng. Formal Model of Correctness and Optimization on Binary Translation[J]. Journal of Computer Research and Development, 2019, 56(9): 2001-2011. DOI: 10.7544/issn1000-1239.2019.20180513
    [2]Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke. Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN[J]. Journal of Computer Research and Development, 2018, 55(10): 2256-2268. DOI: 10.7544/issn1000-1239.2018.20180447
    [3]Wang Yong, Fang Juan, Ren Xingtian, and Lin Li. Formal Verification of TCG Remote Attestation Protocols Based on Process Algebra[J]. Journal of Computer Research and Development, 2013, 50(2): 325-331.
    [4]Qian Zhenjiang, Liu Wei, and Huang Hao. OSOSM:Operating System Object Semantics Model and Formal Verification[J]. Journal of Computer Research and Development, 2012, 49(12): 2702-2712.
    [5]Han Jin, Cai Shengwen, Wang Chongjun, Lai Haiguang, Xie Junyuan. A New Security Protocol Modeling Approach Based on π/+t Calculus[J]. Journal of Computer Research and Development, 2010, 47(4): 613-620.
    [6]Hou Jinkui, Wan Jiancheng, Yang Xiao, and Wang Haiyang. Formal Semantics of Component-Based Architecture Model Mapping[J]. Journal of Computer Research and Development, 2009, 46(2): 310-320.
    [7]Zhao Yu, Wang Yadi, Han Jihong, Fan Yudan, and Zhang Chao. A Formal Model for Cryptographic Protocols Based on Planning Theory[J]. Journal of Computer Research and Development, 2008, 45(9).
    [8]Gu Yonggen, Fu Yuxi. Formal Analysis of Security Protocol Based on Process Calculus and Knowledge Derivation[J]. Journal of Computer Research and Development, 2006, 43(5): 953-958.
    [9]Liu Wei and Liu Zongtian. A Formal Framework for Agent-Oriented Analysis and Design Based on Grid[J]. Journal of Computer Research and Development, 2005, 42(8): 1376-1383.
    [10]Yang Peng and Wu Jiagao. Research on Network Service Architecture and Its Formal Model[J]. Journal of Computer Research and Development, 2005, 42(7): 1115-1122.

Catalog

    Article views (723) PDF downloads (460) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return