Residential College | false |
Status | 已發表Published |
Analyzing and verifying Petri net model of security protocol based on Maria | |
Wang Y.; Zhou J.; Li H.; Hao Y. | |
2010-12-06 | |
Conference Name | 2010 International Conference on Computer Application and System Modeling, ICCASM 2010 |
Source Publication | ICCASM 2010 - 2010 International Conference on Computer Application and System Modeling, Proceedings |
Volume | 2 |
Conference Date | 22 October 2010 to 24 October 2010 |
Conference Place | Taiyuan, China |
Abstract | Formal specification and analysis of security protocol is a research hotspot in network security at present. This paper models authentication service exchange of Public-Key Kerberos Protocol and an attack against this protocol with Petri nets. The Maria Tool automates analysis and verification of the model and finds that PKINIT -26 protocol has a security flaw. So we improve the model according to PKINIT -27 specification and verify authenticity of the improved model. It argues that Maria has the ability to analyze and verify sophisticated security protocols. Furthermore, it can be widely applied for automated analysis and verification of security protocol. © 2010 IEEE. |
Keyword | Analysis And Verification Maria Petri Net Security Protocol |
DOI | 10.1109/ICCASM.2010.5620733 |
URL | View the original |
Language | 英語English |
Scopus ID | 2-s2.0-78649624486 |
Fulltext Access | |
Citation statistics | |
Document Type | Conference paper |
Collection | University of Macau |
Affiliation | Inner Mongolia University China |
Recommended Citation GB/T 7714 | Wang Y.,Zhou J.,Li H.,et al. Analyzing and verifying Petri net model of security protocol based on Maria[C], 2010. |
APA | Wang Y.., Zhou J.., Li H.., & Hao Y. (2010). Analyzing and verifying Petri net model of security protocol based on Maria. ICCASM 2010 - 2010 International Conference on Computer Application and System Modeling, Proceedings, 2. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment