Design, Modeling and Verification of Security Protocols Based on Event-B Method
Author:
Affiliation:

Clc Number:

Fund Project:

National Natural Science Foundation of China (61672525); Open Projects of the State Key Laboratory of Information Security (Institute of Information Engineering, The Chinese Academy of Sciences) (2016-MS-21)

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    With the progress in software refinement verification methods and theorem provers such as Isabella/HOL and VCC, researchers begin to study the design and modeling of security protocols and verify the correctness of their source codes based on the refinement technique and theorem provers. In this paper, the event-B method and verification tools Isabelle/HOL and VCC are introduced, and the typical work on the design and modeling of security protocols and verification of the correctness of their source codes is surveyed. These work include:the refinement design method of security protocols, the refinement modeling method of TPM-based protocol applications, and the refinement verification method of source code.

    Reference
    Related
    Cited by
Get Citation

李梦君,潘国腾,欧国东.基于Event-B方法的安全协议设计、建模与验证.软件学报,2018,29(11):3400-3411

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:January 08,2018
  • Revised:May 29,2018
  • Adopted:
  • Online: November 06,2018
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063