Design and Verification of Security Protocol for Information Transmission in Digital Campus

Article Preview

Abstract:

This paper mainly studies application of formal design for security protocols in digital campus. With a comprehensive analysis on security requirements of information transmission in digital campus, an information transmission model is built from the viewpoint of information security. Based on this model, a new security protocol, called DCIT for short, is designed. The formal analysis shows that secrecy, integrity, availability, controllability, non-repudiation and identifiability of information during transmission could be insured by DCIT, which could be used as a direction for development of various application systems in digital campus, from the viewpoint of information security.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 532-533)

Pages:

1230-1234

Citation:

Online since:

June 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] J. Backfield, and J. Bambenek, Network Security Model, SANS Institute 2008.

Google Scholar

[2] S. Hummel. Network Security Model-Defining an Enterprise Security Strategy, http://computerdetailreviews.com/2010/07/network-security-model-defining-an-enterprise-security-strategy/.

Google Scholar

[3] L. Buttyan, S. Staamann, and U. Wilhelm, A simple logic for authentication protocol design. In Proceedings of the 11th IEEE Computer Security Foundations Workshop. Los Alamitos, USA: IEEE Computer Society Press, 1998, p.153–162.

DOI: 10.1109/csfw.1998.683165

Google Scholar

[4] J. D. Guttman, Security protocol design via authentication tests. In Proceedings of the 15th IEEE Computer Security Foundations Workshop. Los Alamitos, USA: IEEE Computer Society Press, 2002, pp.92-103.

DOI: 10.1109/csfw.2002.1021809

Google Scholar

[5] D. Song, An automatic approach for building secure systems. PhD thesis, California : University of California at Berkeley, 2002.

Google Scholar

[6] Hyun-Jin Choi, Security protocol design by composition[D]. PhD thesis, Cambridge, UK: University of Cambridge, 2006.

Google Scholar