UM
Residential Collegefalse
Status已發表Published
Analyzing and verifying Petri net model of security protocol based on Maria
Wang Y.; Zhou J.; Li H.; Hao Y.
2010-12-06
Conference Name2010 International Conference on Computer Application and System Modeling, ICCASM 2010
Source PublicationICCASM 2010 - 2010 International Conference on Computer Application and System Modeling, Proceedings
Volume2
Conference Date22 October 2010 to 24 October 2010
Conference PlaceTaiyuan, China
Abstract

Formal specification and analysis of security protocol is a research hotspot in network security at present. This paper models authentication service exchange of Public-Key Kerberos Protocol and an attack against this protocol with Petri nets. The Maria Tool automates analysis and verification of the model and finds that PKINIT -26 protocol has a security flaw. So we improve the model according to PKINIT -27 specification and verify authenticity of the improved model. It argues that Maria has the ability to analyze and verify sophisticated security protocols. Furthermore, it can be widely applied for automated analysis and verification of security protocol. © 2010 IEEE.

KeywordAnalysis And Verification Maria Petri Net Security Protocol
DOI10.1109/ICCASM.2010.5620733
URLView the original
Language英語English
Scopus ID2-s2.0-78649624486
Fulltext Access
Citation statistics
Document TypeConference paper
CollectionUniversity of Macau
AffiliationInner Mongolia University China
Recommended Citation
GB/T 7714
Wang Y.,Zhou J.,Li H.,et al. Analyzing and verifying Petri net model of security protocol based on Maria[C], 2010.
APA Wang Y.., Zhou J.., Li H.., & Hao Y. (2010). Analyzing and verifying Petri net model of security protocol based on Maria. ICCASM 2010 - 2010 International Conference on Computer Application and System Modeling, Proceedings, 2.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Wang Y.]'s Articles
[Zhou J.]'s Articles
[Li H.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Wang Y.]'s Articles
[Zhou J.]'s Articles
[Li H.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Wang Y.]'s Articles
[Zhou J.]'s Articles
[Li H.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.