形式化的政策和程序通常用于建立和制度化的网络安全程序。
Formalized policies and procedures are typically used to establish and institutionalize a cyber security program.
为满足联锁软件黑箱测试的要求,对联锁软件安全性需求进行了分级形式化表达。
To meet the requirements for black box testing of CISS (Computer Interlocking safety critical Software), the safety requirements of CISS are denoted hierarchically and formally.
最后想指出的是,我们通过对验证逻辑在信息安全方面的一些尝试和研究,说明了形式化逻辑方法确实可以在这个领域上发挥重要作用。
Finally, through the attempt and research on verification logic in the field of information security, we point that formal logic method is sure playing a main role in it.
从一个实用系统出发,采用形式化的证明方法,分析了电子资金转帐系统中安全协议的保密性和可鉴别性。
From an application system, this paper analyzes the privacy and authenticity of a security protocol in the electronic fund transfer system with a formal proof method.
提出了一种新颖的形式化方法,可以用于分析电子商务协议的安全性质,例如可追究性和公平性。
A formal method which can be used to analyze security properties such as accountability and fairness in electronic commerce protocols is presented.
串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.
事实证明,串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.
然后对系统结构化要求进行了形式化的描述,并证明通过提出的结构化方法可以获得安全的进程环境。
Then we formalized structural requirements of process environment, and proved that a secure process environment can be available by structured method proposed.
设计一个满足安全需求的协议非常困难,并且极易出错,因此利用形式化方法来检验安全协议引起了人们极大的关注。
Design of a protocol is a difficult and error-prone task, thus the use of formal methods that allow for the verification of such protocols has received increasing attention.
串空间模型吸收了前人的研究成果,是分析安全协议的一种实用、直观和严格的形式化方法。
Having fully absorbed the former researching results, strand space model become a practical, intuitive and strict method for security protocols analysis.
而是否具有形式化的可证安全性,是衡量密码体制是否安全的最重要的标准。
While, the most important principle in evaluating a cryptosystem is whether it can be proved to be secure formally.
一些研究人员在密码协议分析中引入形式化方法,通过建立形式模型和自动检测工具分析密码协议的安全性,取得了较大的成功。
Some researchers introduced formal methods for analyzing cryptographic protocols, and achieved many significant results by building formal models and automatic verifying tools.
并采用BAN认证逻辑对协议的安全性进行了形式化证明,也对协议的计算复杂性进行了定性分析。
Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
论文首先给出协议的形式化描述,然后讨论了协议的安全性、可鉴别性和可验证性。
This paper gives the formal description of the two-party protocol, and discusses the security, authenticability and verifiability for two-praty protocols.
密码协议必须满足安全属性的需求,对密码协议进行形式化规范需要证明其满足该属性。
The cryptographic protocol should always satisfy security properties, so the formal specification should give the corresponding proof method.
采用形式化方法分析安全协议是协议分析的有效手段,近年来,出现了众多的研究方法。
Using formal method to analyze security protocol is a valid method to the analysis of security protocols. In recent years, a lot of formal methods appeared.
安全模型是安全系统开发的基石,而形式化方法则为准确理解安全模型提供了高保障依据。
The security model is the cornerstone for developing the security operating system, while the formal method provides high level assurance for the understanding of the security model accurately.
本文提出了一种新的简单的迹语义,用于刻画协议部分安全性质,即只针对协议规约的单个主体,此技术支持协议设计者对安全性质进行形式化规约。
This paper proposes a new simple trace semantics that can be used to specify security properties, this technique supports a protocol designer to provide formal analysis of the security properties.
其次我们分析了网络环境下的攻击者模型,考虑了承诺方案应该具备的性质,并形式化定义出在裸公钥模型下承诺方案应该达到的安全属性。
Next we consider the adversarial model in the Internet environment. We analyze properties that commitment schemes should have especially in the bare public key model and give a formal definition.
采用近世代数和时序逻辑的方法定义了形式化描述语言,并形式化地描述了密码协议的分层安全需求。
Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols.
本文呈现了我们构造的形式化灰色时序安全策略规范语言(GTSL)。 GTSL的理论基础是灰色系统理论和时序规范语言LO-TOS理论。
The theory basis of GTSL is the theory of grey system and that of LOTOS, the language of temporal ordering specification.
通过建立协议的理想化模型,利用BAN逻辑形式化分析该协议,在理论上证明其安全性。
After setting up the idealized protocol model, a process of formal analysis of this protocol is presented and the security is proved theoretically by using the BAN logic.
通过建立协议的理想化模型,利用BAN逻辑形式化分析该协议,在理论上证明其安全性。
After setting up the idealized protocol model, a process of formal analysis of this protocol is presented and the security is proved theoretically by using the BAN logic.
应用推荐