Research on the Application of Spatial Logic in the Security Protocol Verification of Computer

Article Preview

Abstract:

The security protocol is the core technology of the network communication security system which can maintain the security of the network environment effectively. With the increasing of the amount of network data, how to make security protocol to meet customers needs for network and information security and how to improve the efficiency of the security agreement are the focuses of exploration of the field of computer security. This paper introduces the security agreement composite form based on the theory of computer logic program, strand space model theory and certification test method. It also expands the Kailar logic and concludes the automotive verification algorithm of security protocol AAAP-KM algorithm. At last, this paper verifies the effectiveness and fastness of AAAP-KM algorithm taking the KM security protocol for example which provide a theoretical reference and technical support for the application and research of cyberspace logical security agreement.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2379-2383

Citation:

Online since:

February 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Yuanfang Pu, Wei Zhang, Shaohua Teng, Hongyue Du. The detection of collaborative network intrusion based on decision tree [J]. Jiangxi Normal University(Natural Science). 2010; 34 (3): 302-307.

Google Scholar

[2] Zhijun Zhu, Zichun Le, Ran Zhu. Research and implementation of OBS network simulation platform based on NS2 [J]. Communications. 2011; 30 (9): 128-134.

Google Scholar

[3] Jun Liu, Zhe Li, Lei Yue. The design and implementation of self-organizing network simulation platform [J]. Computer Science. 2010; 35 (1): 24-26, 30.

Google Scholar

[4] Di Wu, Xiaogang Zhao, Fengxian Zhu. Research and implementation of UAV Ad Hoc network simulation in wanted environment [J]. Journal of System Simulation. 2010; 20 (23): 6409-6413, 6428.

Google Scholar

[5] Huaiwei Shi, Hua Wang. Research on the application of OPNET network simulation technology [J]. Computer Engineering and Design. 2010; (09): 32-33.

Google Scholar

[6] Daguo Qin, Xiaowu Chen, Bo Li and so on. The space situational calculation and visual modeling [J]. Systems Engineering and Electronics. 2011; 31 (12): 2904 -2907.

Google Scholar

[7] Houqing Lu, Feng Wang, Yisheng Song and so on. Damage assessment system based on the combat simulation [J]. PLA University of Science and Technology: Natural Science Edition. 2011; 10 (2): 139-143.

Google Scholar

[8] Huimo Wang, Yu Zhang. Research on the simulation trend data model of joint operations [J]. Journal of System Simulation. 2010; 20 (15): 4186-4188.

Google Scholar

[9] Zemin Xu, He Jun. Design and implementation of the battlefield three-dimensional graphic simulation system [J]. Computer Applications. 2011; 29 (1): 313-316.

Google Scholar

[10] Chao Yang, Chunjie Cao, Jianfeng Ma. Universally, combined and security mesh network authentication protocol [J]. Xi'an University of Electronic Technology. 2011; 34 (5): 814-517.

Google Scholar