{"title":"正式定义身份验证属性的不同方法","authors":"Zhen Song, Zhoujun Li, Wenhua Dou","doi":"10.1109/APCC.2003.1274481","DOIUrl":null,"url":null,"abstract":"Security goals should be parts of the description of security protocols. If the security goal cannot be precisely described in the narration, formal verification will lose its sense. But unlike secrecy, authentication property is rarely made clear precisely what it means. Various approaches were previously proposed for the formal definition of authentication property. This article describes taxonomy of these different definitions and discusses their respective problems. It is intended to be a survey and arise some deeper research.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Different approaches for the formal definition of authentication property\",\"authors\":\"Zhen Song, Zhoujun Li, Wenhua Dou\",\"doi\":\"10.1109/APCC.2003.1274481\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security goals should be parts of the description of security protocols. If the security goal cannot be precisely described in the narration, formal verification will lose its sense. But unlike secrecy, authentication property is rarely made clear precisely what it means. Various approaches were previously proposed for the formal definition of authentication property. This article describes taxonomy of these different definitions and discusses their respective problems. It is intended to be a survey and arise some deeper research.\",\"PeriodicalId\":277507,\"journal\":{\"name\":\"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APCC.2003.1274481\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APCC.2003.1274481","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Different approaches for the formal definition of authentication property
Security goals should be parts of the description of security protocols. If the security goal cannot be precisely described in the narration, formal verification will lose its sense. But unlike secrecy, authentication property is rarely made clear precisely what it means. Various approaches were previously proposed for the formal definition of authentication property. This article describes taxonomy of these different definitions and discusses their respective problems. It is intended to be a survey and arise some deeper research.