A System for Deriving Vulnerabilities of Security Protocols
碩士 === 國立交通大學 === 資訊科學系所 === 93 === A security protocol plays an important role in network environment in that under current network environment, no one can make sure whom he is “talking” to is whom he was intending to talk to. The soundness of a security protocol has been drawing many spotlights si...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/77828963901121099706 |
id |
ndltd-TW-093NCTU5394060 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093NCTU53940602016-06-06T04:10:40Z http://ndltd.ncl.edu.tw/handle/77828963901121099706 A System for Deriving Vulnerabilities of Security Protocols 安全規約分析系統 蔡柏良 碩士 國立交通大學 資訊科學系所 93 A security protocol plays an important role in network environment in that under current network environment, no one can make sure whom he is “talking” to is whom he was intending to talk to. The soundness of a security protocol has been drawing many spotlights since past years. Many logic systems have been proposed in plenty of papers. However, they are either hard to implement or need lots of experience. We propose an efficient system for inspecting the correctness of security protocols and its implementation, which we adopt prolog language as our derivation engine. Then we suggest detection methods to reveal the potential vulnerabilities of a security protocol. We believe that the proposed system will be helpful in testing a security protocol. 楊武 2005 學位論文 ; thesis 55 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊科學系所 === 93 === A security protocol plays an important role in network environment in that under current network environment, no one can make sure whom he is “talking” to is whom he was intending to talk to. The soundness of a security protocol has been drawing many spotlights since past years. Many logic systems have been proposed in plenty of papers. However, they are either hard to implement or need lots of experience. We propose an efficient system for inspecting the correctness of security protocols and its implementation, which we adopt prolog language as our derivation engine. Then we suggest detection methods to reveal the potential vulnerabilities of a security protocol. We believe that the proposed system will be helpful in testing a security protocol.
|
author2 |
楊武 |
author_facet |
楊武 蔡柏良 |
author |
蔡柏良 |
spellingShingle |
蔡柏良 A System for Deriving Vulnerabilities of Security Protocols |
author_sort |
蔡柏良 |
title |
A System for Deriving Vulnerabilities of Security Protocols |
title_short |
A System for Deriving Vulnerabilities of Security Protocols |
title_full |
A System for Deriving Vulnerabilities of Security Protocols |
title_fullStr |
A System for Deriving Vulnerabilities of Security Protocols |
title_full_unstemmed |
A System for Deriving Vulnerabilities of Security Protocols |
title_sort |
system for deriving vulnerabilities of security protocols |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/77828963901121099706 |
work_keys_str_mv |
AT càibǎiliáng asystemforderivingvulnerabilitiesofsecurityprotocols AT càibǎiliáng ānquánguīyuēfēnxīxìtǒng AT càibǎiliáng systemforderivingvulnerabilitiesofsecurityprotocols |
_version_ |
1718294385008836608 |