Formal Analysis and Verification of OAuth 2.0 Protocol Improved by Key Cryptosystems

来源 :Chinese Journal of Electronics | 被引量 : 0次 | 上传用户:jxgalcj
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The reasons which take huge losses to enterprises and users are:Open authorization(OAuth)2.0protocol is excessively dependent on Hyper text transfer protocol over secure socket layer(HTTPS)to transmit data and ignores per-message encryption,and the transmission efficiency of HTTPS is too low to work well under poor network.The improved OAuth 2.0 modified by Hyper text transfer protocol(HTTP),public key system and private key signature is proposed.With verifying the security of OAuth 2.0 by model checking technology,an improved protocol of higher security is acquired.Comparing different protocol modeling optimized by three combination optimization strategies which involve technologies such as type checking,static analysis and syntactic reordering,an optimal security verification model of the improved protocol is obtained.Program enumeration is presented to compute the repository of attacker.The modeling method of attacker above can effectively reduce the complexity of attacker modeling,consequently those methods can be applied to analyze and validate multi-principal protocols. The reasons which take huge losses to enterprises and users are: Open authorization (OAuth) 2.0 protocol is excessively dependent on Hyper text transfer protocol over secure socket layer (HTTPS) to transmit data and ignores per-message encryption, and the transmission efficiency of HTTPS is too low to work well under poor network. The improved OAuth 2.0 modified by Hyper text transfer protocol (HTTP), public key system and private key signature is proposed. Valid verifying the security of OAuth 2.0 by model checking technology, an improved protocol of higher security is acquired. Comparing different protocol modeling optimized by three combination optimization strategies which involve technologies such as type checking, static analysis and syntactic reordering, an optimal security verification model of the improved protocol is obtained. Programming enumeration is presented to compute the repository of attacker. The modeling method of attacker above can effectively reduce the complexity of attacker modeling, Among those methods can be applied to analyze and validate multi-principal protocols.
其他文献
介绍用模拟探伤仪测金属材料声速的原理、方法及实测结果。用数据对比展示了实测结果的精确程度 ,讨论了可能产生误差的原因。 This paper introduces the principle, metho
一天下午,我像往常那样看门诊,一位中年阿姨被人搀扶着进来了.“医生,我的右眼突然看不见了.”她神情焦虑,极其紧张.“别着急,坐下慢慢说.”我指引她先摸了一下凳子,然后轻轻
期刊
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生、测量监控等方面人手,介绍了S226海滨大桥
【摘 要】分析早期康复护理对脑卒中患者功能预后的影响。方法 选择2008年1月至2008年12月在我科收治的120例缺血性脑卒中患者,分康复组和对照组各60例,两组患者均接受神经内科常规治疗和护理。康复组除常规护理外,在患者生命体征稳定、神志清楚、神经系统症状不再恶化48 h后即采用早期综合康复护理方案。治疗前后肌张力评定采用Ashwarth评分法评定瘫痪肢体的运动功能及Barthel指数评定日常
期刊
Fragmentation usually occurs when data space of original storage nodes has to be reallocated to new added storage nodes during the scale-out evolution of the la
生姜是我们生活中常见的一种食材,在冬季选择生姜养生效果很好,若是每天晚上坚持使用生姜来泡脚有益于身心健康,改善了末梢神经血液循环不畅的情况,生姜泡脚会有哪些好处呢.r
期刊
通过手动超声波探伤对钢套管的微裂纹进行有效检测 ,并解剖实物 ,以指导生产工艺改进 ,杜绝微裂纹的发生。 Through manual ultrasonic flaw detection, the micro-cracks o