A General Model Checking Method of Electronic Transaction Protocols Using Colored Petri Nets

被引:1
|
作者
Xu, Meng [1 ]
Su, Guiping [1 ]
Wei, Jin [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, Sch Informat Sci & Engn, Beijing, Peoples R China
来源
HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS | 2009年
关键词
model checking; Colored Petri Nets; E-Commerce;
D O I
10.1109/HIS.2009.172
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As a special kind of security protocol, E-Commerce protocols have been analyzed with many formal methods in recent years. However, there is no general specification and verification model checking method to be applied effectively to the four special properties in E-Commerce protocols non-repudiation, accountability, fairness, and timeliness. Based on our previous work on the suitability of Colored Petri Nets(CPNs) to the formal analysis of timeliness, this paper concentrates on the formal modeling and analysis of the other three properties using CPNs. Combined with Petri net reduction methods and random numbers as time factors and keys, we describe and analyze both online Trusted Third Party (TTP) and offline TTP protocols, discover their flaws which could not be found by many other formal methods, proving that our methods are more general and suitable for nearly all the E-Commerce protocols.
引用
收藏
页码:298 / 303
页数:6
相关论文
共 50 条
  • [1] A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach
    Katsaros, Panagiotis
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (02) : 235 - 257
  • [2] An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets
    Wei, Jin
    Su, Guiping
    Xu, Meng
    11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 457 - 460
  • [3] Analysis of Concurrent Security Protocols Using Colored Petri Nets
    Long, Shigong
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 227 - 230
  • [4] Analysis of two authorization protocols using Colored Petri Nets
    Younes Seifi
    Suriadi Suriadi
    Ernest Foo
    Colin Boyd
    International Journal of Information Security, 2015, 14 : 221 - 247
  • [5] Analysis of two authorization protocols using Colored Petri Nets
    Seifi, Younes
    Suriadi, Suriadi
    Foo, Ernest
    Boyd, Colin
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (03) : 221 - 247
  • [6] Using colored Petri nets to simulate object Petri nets
    Corchado, FFR
    Gallegos, FZ
    Jiménez, AA
    Dávila, HIP
    International Conference on Computing, Communications and Control Technologies, Vol 5, Proceedings, 2004, : 27 - 31
  • [7] Model checking Petri nets with MSVL
    Shi, Ya
    Tian, Cong
    Duan, Zhenhua
    Zhou, Mengchu
    INFORMATION SCIENCES, 2016, 363 : 274 - 291
  • [8] Pattern Based Model Reuse Using Colored Petri Nets
    Askari, Syed Hassan
    Khan, Shahrukh Ali
    Haris, Muhammad
    Shoaib, Muhammad
    2019 19TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2019), 2019, : 32 - 38
  • [9] Model Checking of Variable Petri Nets by Using the Kripke Structure
    Yang, Ru
    Ding, Zhijun
    Guo, Tong
    Pan, Meiqin
    Jiang, Changjun
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (12): : 7774 - 7786
  • [10] Model Checking Control Flow Petri Nets Using PAT
    Ho, Dung T.
    Bui, Thang H.
    Quan, Tho T.
    PROCEEDINGS OF THE 2013 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2013), 2013, : 124 - 129