A General Model Checking Method of Electronic Transaction Protocols Using Colored Petri Nets

被引:1
作者
Xu, Meng [1 ]
Su, Guiping [1 ]
Wei, Jin [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, Sch Informat Sci & Engn, Beijing, Peoples R China
来源
HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS | 2009年
关键词
model checking; Colored Petri Nets; E-Commerce;
D O I
10.1109/HIS.2009.172
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As a special kind of security protocol, E-Commerce protocols have been analyzed with many formal methods in recent years. However, there is no general specification and verification model checking method to be applied effectively to the four special properties in E-Commerce protocols non-repudiation, accountability, fairness, and timeliness. Based on our previous work on the suitability of Colored Petri Nets(CPNs) to the formal analysis of timeliness, this paper concentrates on the formal modeling and analysis of the other three properties using CPNs. Combined with Petri net reduction methods and random numbers as time factors and keys, we describe and analyze both online Trusted Third Party (TTP) and offline TTP protocols, discover their flaws which could not be found by many other formal methods, proving that our methods are more general and suitable for nearly all the E-Commerce protocols.
引用
收藏
页码:298 / 303
页数:6
相关论文
共 22 条
[11]  
Li Bo-Tao, 2006, Journal of Software, V17, P1510, DOI 10.1360/jos171510
[12]  
[黎波涛 Li Botao], 2005, [计算机研究与发展, Journal of Computer Research and Development], V42, P1571, DOI 10.1360/crad20050918
[13]  
LI GQ, 2007, ON THE FLY MODEL CHE, P923
[14]  
LIU WQ, 2008, J SYSTEM SIMULATION, V20
[15]  
QING SH, 2003, J SOFTWARE, V14, P193
[16]  
SCHNEIDERS, 1998, P 11 IEEE COMP SEC F, P54
[17]   An application of Petri net reduction for Ada tasking deadlock analysis [J].
Shatz, SM ;
Tu, SR ;
Murata, T ;
Duri, S .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 1996, 7 (12) :1307-1322
[18]   Finite-state analysis of two contract signing protocols [J].
Shmatikov, V ;
Mitchell, JC .
THEORETICAL COMPUTER SCIENCE, 2002, 283 (02) :419-450
[19]   Considering Time in Formal Analysis of Security Protocols Using Colored Petri Nets [J].
Xu, Meng ;
Su, Guiping ;
Ding, Yanlan .
2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, :63-68
[20]  
ZHOLL J, 1998, P 1998 INT REF WORKS, P370