Design and Verification of Security Protocol for Information Transmission in Digital Campus

Abstract:

Article Preview

This paper mainly studies application of formal design for security protocols in digital campus. With a comprehensive analysis on security requirements of information transmission in digital campus, an information transmission model is built from the viewpoint of information security. Based on this model, a new security protocol, called DCIT for short, is designed. The formal analysis shows that secrecy, integrity, availability, controllability, non-repudiation and identifiability of information during transmission could be insured by DCIT, which could be used as a direction for development of various application systems in digital campus, from the viewpoint of information security.

Info:

Periodical:

Advanced Materials Research (Volumes 532-533)

Edited by:

Suozhang Cai and Mingli Li

Pages:

1230-1234

Citation:

X. L. Li et al., "Design and Verification of Security Protocol for Information Transmission in Digital Campus", Advanced Materials Research, Vols. 532-533, pp. 1230-1234, 2012

Online since:

June 2012

Export:

Price:

$38.00

[1] J. Backfield, and J. Bambenek, Network Security Model, SANS Institute (2008).

[2] S. Hummel. Network Security Model-Defining an Enterprise Security Strategy, http: /computerdetailreviews. com/2010/07/network-security-model-defining-an-enterprise-security-strategy.

[3] L. Buttyan, S. Staamann, and U. Wilhelm, A simple logic for authentication protocol design. In Proceedings of the 11th IEEE Computer Security Foundations Workshop. Los Alamitos, USA: IEEE Computer Society Press, 1998, p.153–162.

DOI: https://doi.org/10.1109/csfw.1998.683165

[4] J. D. Guttman, Security protocol design via authentication tests. In Proceedings of the 15th IEEE Computer Security Foundations Workshop. Los Alamitos, USA: IEEE Computer Society Press, 2002, pp.92-103.

DOI: https://doi.org/10.1109/csfw.2002.1021809

[5] D. Song, An automatic approach for building secure systems. PhD thesis, California : University of California at Berkeley, (2002).

[6] Hyun-Jin Choi, Security protocol design by composition[D]. PhD thesis, Cambridge, UK: University of Cambridge, (2006).

Fetching data from Crossref.
This may take some time to load.