摘要

In the world of designing security data transfer protocol, verification is a crucial step to eliminate weaknesses and inaccuracies of security protocols. There are many models to verify security data transfer protocol, including, Finite State Automaton (FMA), Colored Petri Nets (CP-Nets), etc. This paper presents a methodology for the formal specification, analysis and verification of a private data transfer protocol in a secure operating system with internal network structure based on the use of Colored Petri nets and automata theory, and show how CP-Nets can be used to analyze and improve the protocol.

  • 出版日期2011

全文