We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Rui Xue, Deng-Guo Feng. New Semantic Model for Authentication Protocols in ASMs[J]. Journal of Computer Science and Technology, 2004, 19(4).
Citation: Rui Xue, Deng-Guo Feng. New Semantic Model for Authentication Protocols in ASMs[J]. Journal of Computer Science and Technology, 2004, 19(4).

New Semantic Model for Authentication Protocols in ASMs

More Information
  • Published Date: July 14, 2004
  • A new semantic model in Abstract State Model (ASM) for authentication protocols is presented. It highlights the Woo-Lam's ideas for authentication, which is the strongest one in Lowe's definition hierarchy for entity authentication. Apart from the flexible and natural features in forming and analyzing protocols inherited from ASM, the model defines both authentication and secrecy properties explicitly in first order sentences as invariants. The process of proving security properties with respect to an authentication protocol blends the correctness and secrecy properties together to avoid the potential flaws which may happen when treated separately. The security of revised Helsinki protocol is shown as a case study. The new model is different from the previous ones in ASMs.
  • Related Articles

    [1]Chi Zhang, Jun-Rong Liu, Da-Wu Gu, Wei-Jia Wang, Xiang-Jun Lu, Zheng Guo, Hai-Ning Lu. Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks[J]. Journal of Computer Science and Technology, 2019, 34(5): 1079-1095. DOI: 10.1007/s11390-019-1961-5
    [2]Kai-Le Su, Qing-Liang Chen, Abdul Sattar, Wei-Ya Yue, Guan-Feng Lv, Xi-Zhong Zheng. Verification of Authentication Protocols for Epistemic Goals via SAT Compilation[J]. Journal of Computer Science and Technology, 2006, 21(6): 932-943.
    [3]ZHAN Yongzhao, SONG Snunlin, XIE Li. Demand Priority Protocol Simulation and Evaluation[J]. Journal of Computer Science and Technology, 1999, 14(6): 599-605.
    [4]XU Mingwei, WU Jianping. A Formal Approach to Protocol Performance Testing[J]. Journal of Computer Science and Technology, 1999, 14(1): 81-87.
    [5]Hao Ruibing, Wu Jianping. A Formal Approach to Protocol Interoperability Testing[J]. Journal of Computer Science and Technology, 1998, 13(1): 79-90.
    [6]Luo Junzhou, Gu Guanqun. CIMS Network Protocol and Its Net Models[J]. Journal of Computer Science and Technology, 1997, 12(5): 476-481.
    [7]Wang Yun, Gu Guanqun, Dui Jiyin. Research on Protocol Migration[J]. Journal of Computer Science and Technology, 1996, 11(6): 601-606.
    [8]Luo Gang. Generating Conformance Tests for Nondeterministic Protocol Machines[J]. Journal of Computer Science and Technology, 1994, 9(4): 289-301.
    [9]Li Layuan. A New Formal Method for Communication Protocol Specification[J]. Journal of Computer Science and Technology, 1989, 4(1): 14-22.
    [10]Feng Yulin. Hierarchical Protocol Analysis by Temporal Logic[J]. Journal of Computer Science and Technology, 1988, 3(1): 56-69.

Catalog

    Article views (16) PDF downloads (1434) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return