Formal Specification of Information Transmission Architecture Based on Automatic Generation of Primitives in Digital Campus

Article Preview

Abstract:

Based on comprehensive analysis on security requirements of information transmission, security primitive is generated by automatic tool in asymmetric key cryptosystem, and improved with addition of compositional factors. And then, formal processes of secure information transmission are constructed with composition method. Formal analysis shows that, secrecy, integrity, availability, controllability, non-repudiation and identifiability during information transmission can be insured by this architecture, as a common framework for development of various application systems in digital campus from the viewpoint of information security.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1644-1647

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Yuan-jiao Zhu, Ke-qin Zhou, Design and Realizing of the Digital Campus Security System, WCSE, vol. 4, pp.305-309, (2009).

Google Scholar

[2] J. Backfield, and J. Bambenek, Network Security Model, SANS Institute (2008).

Google Scholar

[3] Foley. S. N, Zhou, H. Towards an architecture for autonomic security protocols. In Proceedings of International Security Protocols Workshop (Cambridge, England, 2003), Springer-Verlag, p.25–30.

Google Scholar

[4] D. Song. An Automatic Approach for Building Secure Systems. PhD thesis, University of California at Berkeley, (2002).

Google Scholar

[5] Hyun-Jin Choi. Security protocol design by composition. PhD thesis, Cambridge, UK: University of Cambridge, (2006).

Google Scholar