Journal on Communications ›› 2013, Vol. 34 ›› Issue (3): 183-191.doi: 10.3969/j.issn.1000-436x.2013.03.024
• Academic communication • Previous Articles Next Articles
Hong-yu YANG,Jin-bo YU,Li-xia XIE
Online:
2013-03-25
Published:
2017-07-20
Supported by:
Hong-yu YANG,Jin-bo YU,Li-xia XIE. Three-dimensional spherical model based XML communication protocols security evaluation method[J]. Journal on Communications, 2013, 34(3): 183-191.
"
安全等级 | 指标B1评估值 | 指标B2评估值 | 指标B3评估值 |
一级 | V1=(V11,V12,V13,V14) | V2=(V21,V22,V23) | V3=(V31,V32,V33,V34) |
S1'=(S11',S12',S13',S14') | S2'=(S21',S22',S23') | S3'=(S31',S32',S33',S34') | |
Q11=V11*S11', | Q21=V21*S21', | Q31=V31*S31', | |
S11'=0.169 8p | S21'=0.076 4p | S31'=0.051 6p | |
Q12=V12*S12', | Q22=V22*S22', | Q32=V32*S32', | |
S12'=0.169 8p | S22'=0.081 6p | S32'=0.051 6p | |
二级 | Q13=V13*S13', | Q23=V23*S23', | Q33=V33*S33', |
S13'=0.039 2p | S23'=0.081 6p | S33'=0.051 6p | |
`Q14=V14*S14', | Q34=V34*S34', | ||
S14'=0.159 0p | S34'=0.051 6p |
[1] | LIJ , CHENH , DENGF , et al. A security evaluation method based on threat classification for Web service[J]. Journal of Software, 2011,6(4): 595-603. |
[2] | 程睿 . 基于 SOA的SOAP消息交互安全机制的研究与实现[D]. 西安: 西安电子科技大学, 2008. CHENGR . Research and Implementation on Security Mechanism of SOAP Message Exchange Based on SOA[D]. Xian: Xidian University, 2008. |
[3] | ALROUHB , GHINEAG . A performance evaluation of security me-chanisms for Web services[A]. Proc of the 2009 Fifth International Conference on Information Assurance and Security[C]. Piscataway, USA, 2009. 715-718. |
[4] | 孙丁丁 . 通过 SOAP扩展优化Web服务性能的研究[D]. 乌鲁木齐: 新疆大学, 2007. SUND D . Research on Optimizing Web Service via SOAP Exten-sion[D]. Urumqi: Xinjiang University, 2007. |
[5] | 陈晓苏, 周晴, 肖道举 . Web服务中UDDI安全机制研究[J]. 华中科技大学学报, 2005,30(8): 58-60. CHENX S , ZHOUQ , XIAOD J . Study of security mechanisms of UDDI in Web service[J]. Journal of Huazhong University of Science and Technology(Nature Science), 2005,30(8): 58-60. |
[6] | 尹星 . 基于SAML的单点登录模型及其安全的研究与实现[D]. 镇江: 江苏大学, 2005. YINX . Research and Implementation of SAML-Based SSO Model and it's Security[D]. Zhenjiang: Jiangsu University, 2005. |
[7] | 宓洽群 . 大学教学原理[M]. 上海: 上海交通大学出版社, 1989. 97-100. MIQ Q . University Teaching Principles[M]. Shanghai: Shanghai Jiaotong University Press, 1989. 97-100. |
[8] | 徐耀玲, 唐五湘, 吴秉坚 . 科技评估指标体系设计的原则及其应用研究[J]. 中国软科学, 2010,30(2): 48-51. XUY L , TANGW X , WUB J . Design principle and application of S&T evaluation index system[J]. China Soft Science, 2010,30(2): 48-51. |
[9] | 杨宏宇, 谢丽霞, 朱丹 . 漏洞严重性的灰色层次分析评估模型[J]. 电子科技大学学报, 2010,39(5): 778-782. YANGH Y , XIEL X , ZHUD . A vulnerability severity grey hierarchy analytic evaluation model[J]. Journal of University of Electronic Science and Technology of China, 2010,39(5): 778-782. |
[10] | PANGJ , PENGX . Trustworthy Web service security risk assessment research[A]. Proc of the 2009 International Forum on Information Technology and Applications[C]. Piscataway, USA, 2009. 417-420. |
[11] | 周晓洁 . 基于模糊综合评价法的船舶热源系统优选研究[D]. 上海: 上海交通大学, 2010. ZHOUX J . Study on The Selection of Marine Heat Source System Based on Fuzzy Comprehensive Evaluation Method[D]. Shanghai: Shanghai Jiaotong University, 2010. |
[12] | 加尔布雷斯 . Web服务安全性高级编程[M]. 北京: 清华大学出版社, 2003. 400-444. GALBRAITHB . Professional Web Services Security[M]. Beijing: Tsinghua University Press, 2003. 400-444. |
[13] | FLYR . Detecting fraud on websites[J]. IEEE Security & Privacy, 2011,9(6): 80-85. |
[14] | ANTUNESN , VIEIRAM . Defending against Web application vulne-rabilities[J]. IEEE Computer, 2012,45(2): 66-72. |
[15] | 陈伟琳 . 协议安全测试理伦和方法的研究[D]. 北京: 中国科学技术大学, 2008. CHENW L . Research on Testing Theory and Methods of Protocol Security[D]. Beijing: University of Science and Technology of China, 2008. |
[16] | 赵德明 . 多维度Web服务安全性评估[D]. 北京: 中国石油大学, 2011. ZHAOD M . Multiple Dimension Security Assessment of Web Ser-vice[D]. Beijing: China University of Petroleum, 2011. |
[1] | Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG. Research and implementation of reputation-based inter-domain routing selection mechanism [J]. Journal on Communications, 2023, 44(6): 47-56. |
[2] | Shengxing YU, Zhong CHEN. Efficient secure federated learning aggregation framework based on homomorphic encryption [J]. Journal on Communications, 2023, 44(1): 14-28. |
[3] | Youliang TIAN, Maoqing TIAN, Hongfeng GAO, Miao HE, Jinbo XIONG. Cooperation-based location authentication scheme for crowdsensing applications [J]. Journal on Communications, 2022, 43(9): 121-133. |
[4] | Guanxiong HA, Qiaowen JIA, Hang CHEN, Chunfu JIA. Data popularity-based encrypted deduplication scheme without third-party servers [J]. Journal on Communications, 2022, 43(8): 17-29. |
[5] | Anqi YIN, Yuanbo GUO, Ding WANG, Tongzhou QU, Lin CHEN. Provably secure quantum resistance two-server password-authenticated key exchange protocol [J]. Journal on Communications, 2022, 43(3): 14-29. |
[6] | Chong LI, Xiujuan DU, Lijuan WANG, Xiaojing TIAN. Rule and perception based MAC protocol for UAN [J]. Journal on Communications, 2022, 43(2): 65-75. |
[7] | Zhengyu ZHU, Pengfei CHEN, Zixuan WANG, Kexian GONG, Di WU, Zhongyong WANG. Short wave protocol signals recognition based on Swin-Transformer [J]. Journal on Communications, 2022, 43(11): 127-135. |
[8] | Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN. Towards edge-collaborative, lightweight and privacy-preserving classification framework [J]. Journal on Communications, 2022, 43(1): 127-137. |
[9] | Xiang GONG, Tao FENG, Jinze DU. Formal modeling and security analysis method of security protocol based on CPN [J]. Journal on Communications, 2021, 42(9): 240-253. |
[10] | Zhiqiang YAO, Zhirong ZHU, Guohua YE. Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement [J]. Journal on Communications, 2021, 42(8): 103-110. |
[11] | Taoshen LI, Anni SHI, Zhe WANG, Lu HE. Optimal relay selection for full duplex SWIPT-NOMA systems with maximal throughput [J]. Journal on Communications, 2021, 42(5): 87-97. |
[12] | Xiangmao CHANG, Jun ZHAN, Zhiwei WANG. Low-cost group-based identity security authentication protocol for NB-IoT nodes [J]. Journal on Communications, 2021, 42(12): 152-162. |
[13] | Hongqiang YAN,Linjie WANG. Research of authentication techniques for the Internet of things [J]. Journal on Communications, 2020, 41(7): 213-222. |
[14] | Chunxiang GU,Weisen WU,Ya’nan SHI,Guangsong LI. Method of unknown protocol classification based on autoencoder [J]. Journal on Communications, 2020, 41(6): 88-97. |
[15] | Yanjing SUN,Junqiu YANG,Yan CHEN,Yanfen WANG,Xiaojing CHEN,Fengzhen LIU,Zhi SUN. RAW online regrouping method in IEEE 802.11ah protocol for industrial Internet of things [J]. Journal on Communications, 2020, 41(4): 92-101. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|