Analysis of Electronic Commerce Protocols Based on Extended Rubin Logic

被引:0
|
作者
Xu, Yang [1 ,2 ]
Xie, Xiaoyao [2 ]
机构
[1] Guizhou Univ, Sch Comp Sci & Technol, Guiyang, Peoples R China
[2] Key Lab Informat & Comp Sci Guizhou Prov, Guiyang, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Electronic commerce protocols are the basis of security in electronic commerce. Therefore, it is essential to ensure these protocols correctly. However, most current protocol analysis methods can only be used to analyze part of properties required by electronic commerce protocols. Rubin logic is a good method for analyzing security protocols. Rubin logic has been extended to analyze electronic commerce protocols. In this paper, Zhou-Gollman protocol is chosen to illustrate how an electronic commerce protocol is analyzed using the extended Rubin logic. Not only the basic security properties but also non-repudiation, accountability and fairness of Zhou-Gollman protocol are analyzed. These are stunning confirmations of the validity of the extended Rubin logic for analyzing electronic commerce protocols.
引用
收藏
页码:2079 / +
页数:2
相关论文
共 50 条
  • [1] Extending Rubin Logic for Electronic Commerce Protocols
    Xu, Yang
    Xie, Xiaoyao
    [J]. 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 448 - 451
  • [2] Analysis of Authentication Protocols Based on Rubin Logic
    Xu, Yang
    Xie, Xiaoyao
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4680 - +
  • [3] A new logic for electronic commerce protocols
    Adi, K
    Debbabi, M
    Mejri, M
    [J]. ALGEBRAIC METHODOLOGY AND SOFTWARE TECHNOLOGY, PROCEEDINGS, 2000, 1816 : 499 - 513
  • [4] A new logic for electronic commerce protocols
    Adi, K
    Debbabi, M
    Mejri, M
    [J]. THEORETICAL COMPUTER SCIENCE, 2003, 291 (03) : 223 - 283
  • [5] A sound logic for analysing electronic commerce protocols
    Kessler, V
    Neumann, H
    [J]. COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 345 - 360
  • [6] Security analysis of routing protocol for MANET based on extended Rubin logic
    Xu, Yang
    Xie, Xiaoyao
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1326 - +
  • [7] Formal Analysis of Timeliness in Electronic Commerce Protocols
    Liu, Yi
    Liu, Xingtong
    Ye, Jiaxi
    Tang, Chaojing
    [J]. 2016 PROGRESS IN ELECTROMAGNETICS RESEARCH SYMPOSIUM (PIERS), 2016, : 3652 - 3656
  • [8] New approach for the analysis of electronic commerce protocols
    Zhou, Dian-Cui
    Qing, Si-Han
    Zhou, Zhan-Fei
    [J]. Ruan Jian Xue Bao/Journal of Software, 2001, 12 (09): : 1318 - 1328
  • [9] A structural fairness based on game and its application to analysis of electronic commerce protocols
    Zhang, Ling
    Yin, Jianping
    Li, Mengjun
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 899 - 902
  • [10] PROOF SCORE APPROACH TO ANALYSIS OF ELECTRONIC COMMERCE PROTOCOLS
    Ogata, Kazuhiro
    Futatsugi, Kokichi
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2010, 20 (02) : 253 - 287