1 Institute for Network Security,PLA Information Engineering University,Zhengzhou 450001,China 2 State Key Laboratory of Mathematical Engineering and Advanced Computing,Wuxi 214125,China
Online:2014-11-25
Published:2017-06-20
Supported by:
Henan Provincial Science and Technology Innovation Fund for Outstanding Young;Foundation and Research in Cutting-edge Technologies in the Project of Henan Province
SUN S T , HAWKEY K , BEZNOSOV K . Systematically breaking and fixing OpenID security:formal analysis,semi-automated empirical evaluation,and practical countermeasures[J]. Computers & Security, 2012,31(4): 465-483.
[2]
TASSANAVIBOON A , GONG G . OAuth and ABE based authorization in semi-trusted cloud computing:aauth[A]. Proceedings of the second international workshop on Data intensive computing in the clouds[C]. ACM, 2011. 41-50.
[3]
ARMANDO A , COMPAGNA L . SATMC:A SAT-based model checker for security protocols[M]. Logics in Artificial Intelligence. Springer Berlin Heidelberg, 2004. 730-733.
[4]
ARMANDO A , BASIN D , BOICHUT Y ,et al. The AVISPA tool for the automated validation of internet security protocols and applications[A]. Computer Aided Verification[C]. Springer Berlin Heidelberg, 2005. 281-285.
[5]
BRADLEY A R . SAT-based model checking without unrolling[A]. Verification,Model Checking,and Abstract Interpretation[C]. Springer Berlin Heidelberg, 2011. 70-87.
[6]
VIZEL Y , GRUMBERG O , SHOHAM S . Lazy abstraction and SAT-based reachability in hardware model checking[A]. Proceedings of the 12th Conference on Formal Methods in Computer-Aided Design[C]. 2012. 173-181.
[7]
JOHNSON S , WILSON G , TANG Y ,et al. SATMC:A Monte Carlo Markov chain approach to SED fitting[A]. American Astronomical Society Meeting Abstracts[C]. 2013.221.
[8]
LOWE G . An attack on the Needham-Schroeder public-key authentication protocol[J]. Information Processing Letters, 1995,56(3): 131-133.
[9]
ZORN G . Microsoft PPP CHAP extensions,version 2[EB/OL]. . 2000
[10]
BIRRELL A D , NELSON B J . Implementing remote procedure calls[J]. ACM Transactions on Computer Systems-TOCS, 1984,2(1): 39-59.
[11]
HAMMER-LAHAV D E , HARDT D.The OAuth2 . 0 Authorization Protocol[R]. IETF Internet Draft, 2011.
[12]
HEATHER J , LOWE G , SCHNEIDER S . How to prevent type flaw attacks on security protocols[J]. Journal of Computer Security, 2003,11(2): 217-244.
[13]
DOLEV D , YAO A C . On the security of public key protocols[A]. Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science[C]. Nashville,TN, 1981, 350-357.
[14]
DAWS C , OLIVERO A , TRIPAKIS S ,et al. The Tool KRONOS[M]. Springer Berlin Heidelberg, 1996. 208-219.