A General Model Checking Method of Electronic Transaction Protocols Using Colored Petri Nets

被引:1
|
作者
Xu, Meng [1 ]
Su, Guiping [1 ]
Wei, Jin [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, Sch Informat Sci & Engn, Beijing, Peoples R China
关键词
model checking; Colored Petri Nets; E-Commerce;
D O I
10.1109/HIS.2009.172
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As a special kind of security protocol, E-Commerce protocols have been analyzed with many formal methods in recent years. However, there is no general specification and verification model checking method to be applied effectively to the four special properties in E-Commerce protocols non-repudiation, accountability, fairness, and timeliness. Based on our previous work on the suitability of Colored Petri Nets(CPNs) to the formal analysis of timeliness, this paper concentrates on the formal modeling and analysis of the other three properties using CPNs. Combined with Petri net reduction methods and random numbers as time factors and keys, we describe and analyze both online Trusted Third Party (TTP) and offline TTP protocols, discover their flaws which could not be found by many other formal methods, proving that our methods are more general and suitable for nearly all the E-Commerce protocols.
引用
收藏
页码:298 / 303
页数:6
相关论文
共 50 条
  • [1] A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach
    Katsaros, Panagiotis
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (02) : 235 - 257
  • [2] An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets
    Wei, Jin
    Su, Guiping
    Xu, Meng
    11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 457 - 460
  • [3] Analysis of Concurrent Security Protocols Using Colored Petri Nets
    Long, Shigong
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 227 - 230
  • [4] Analysis of two authorization protocols using Colored Petri Nets
    Younes Seifi
    Suriadi Suriadi
    Ernest Foo
    Colin Boyd
    International Journal of Information Security, 2015, 14 : 221 - 247
  • [5] Modeling and Analysis of Security Protocols Using Colored Petri Nets
    Xu, Yang
    Xie, Xiaoyao
    JOURNAL OF COMPUTERS, 2011, 6 (01) : 19 - 27
  • [6] Analysis of two authorization protocols using Colored Petri Nets
    Seifi, Younes
    Suriadi, Suriadi
    Foo, Ernest
    Boyd, Colin
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (03) : 221 - 247
  • [7] Modeling and Analysis of Authentication Protocols. Using Colored Petri Nets
    Xu, Yang
    Xie, Xiaoyao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 443 - 448
  • [8] Specification of timed authentication protocols with colored Petri nets
    Jakubowska, G
    Srebrny, M
    ADVANCED COMPUTER SYSTEMS, PROCEEDINGS, 2002, 664 : 383 - 392
  • [9] Using colored Petri nets to simulate object Petri nets
    Corchado, FFR
    Gallegos, FZ
    Jiménez, AA
    Dávila, HIP
    International Conference on Computing, Communications and Control Technologies, Vol 5, Proceedings, 2004, : 27 - 31
  • [10] Considering Time in Formal Analysis of Security Protocols Using Colored Petri Nets
    Xu, Meng
    Su, Guiping
    Ding, Yanlan
    2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 63 - 68