李梦君,潘国腾,欧国东.基于Event-B方法的安全协议设计、建模与验证.软件学报,2018,29(11):3400-3411 |
基于Event-B方法的安全协议设计、建模与验证 |
Design, Modeling and Verification of Security Protocols Based on Event-B Method |
投稿时间:2018-01-08 修订日期:2018-05-29 |
DOI:10.13328/j.cnki.jos.005622 |
中文关键词: 安全协议设计 安全协议建模与验证 精化 Event-B方法 |
英文关键词:security protocol design security protocol modeling and verification refinement event-B method |
基金项目:国家自然科学基金(61672525);中国科学院信息工程研究所信息安全国家重点实验室开放课题(2016-MS-21) |
|
摘要点击次数: 979 |
全文下载次数: 650 |
中文摘要: |
随着软件精化验证方法以及Isabella/HOL、VCC等验证工具不断取得进展,研究者们开始采用精化方法和验证工具设计、建模安全协议和验证安全协议源程序的正确性.在介绍Event-B方法和验证工具Isabella/HOL、VCC的基础上,综述了基于Event-B方法的安全协议形式化设计、建模与源程序验证的典型研究工作,主要包括从需求规范到消息传递形式协议的安全协议精化设计、基于TPM(trusted platform module)的安全协议应用的精化建模以及从消息传递形式协议到代码的源程序精化验证. |
英文摘要: |
With the progress in software refinement verification methods and theorem provers such as Isabella/HOL and VCC, researchers begin to study the design and modeling of security protocols and verify the correctness of their source codes based on the refinement technique and theorem provers. In this paper, the event-B method and verification tools Isabelle/HOL and VCC are introduced, and the typical work on the design and modeling of security protocols and verification of the correctness of their source codes is surveyed. These work include:the refinement design method of security protocols, the refinement modeling method of TPM-based protocol applications, and the refinement verification method of source code. |
HTML 下载PDF全文 查看/发表评论 下载PDF阅读器 |