請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/25121完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 雷欽隆 | |
| dc.contributor.author | Ssu-Ying Li | en |
| dc.contributor.author | 李思穎 | zh_TW |
| dc.date.accessioned | 2021-06-08T06:02:51Z | - |
| dc.date.copyright | 2007-07-27 | |
| dc.date.issued | 2007 | |
| dc.date.submitted | 2007-07-26 | |
| dc.identifier.citation | [1] Matt Blaze and Gerrit Bleumer, Divertible Protocols and Atomic Proxy Cryp-
tography, In Proceedings of Advances in Cryptology EUROCRYPT'98, 1998 [2] Yun-Peng Chiu, Chin-Laung Lei, and Chun-Ying Huang, Secure Multicast Us- ing Proxy Encryption, International Conference on Information and Communi- cations Security, 2005 [3] Stephen E. Deering and David R. Cheriton, Multicast routing in datagram internetworks and extended LANs, ACM Transactions on Computer Systems (TOCS), May 1990 [4] Anca Ivan and Yevgeniy Dodis, Proxy Cryptography Revisited, Proceedings of the tenth Network and Distributed System Security Symposium, February 2003 [5] Daniel Jackson, Automating ‾rst-order relational logic, In Proceedings 8th ACM SIGSOFT Symposium on the Foundations of Software Engineering, November 2000 [6] Daniel Jackson, Alloy: A lightweight object modelling notation, ACM Transac- tions on Software Engineering and Methodology (TOSEM), April 2002 [7] Daniel Jackson, Ian Schechter, and Ilya Shlyakhter, Alcoa: the alloy constraint analyzer, In Proceedings 22nd International Conference on Software Engineer- ing, June 2000 [8] Yongdae Kim and Adrian Perrig and Gene Tsudik, Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups, roceedings of the 7th ACM conference on Computer and communications security, November 2000 [9] Will Marrero, Edmund Clarke, and Somesh Jha, A model checker for authen- tication protocols, In DIMACS Workshop on Design and Formal Veri‾cation of Security Protocols, Septemper 1997 [10] Catherine Meadows, A system for the speci‾cation and analysis of key manage- ment protocols, In Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991 [11] Re‾k Molva and Alain Pannetrat, Scalable Multicast Security with Dynamic Recipient Groups, ACM Transactions on Information and System Security, Aug 2000 [12] Suvo Mittra, Iolus: A Framework for Scalable Secure Multicasting, Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architec- tures, and protocols for computer communication, Septemper 1997 [13] Tina Nolte, Exploring ‾lesystem synchronization with lightweight modeling and analysis, Master's thesis, Massachusettes Institute of Technology, September 2002 [14] Sandro Rafaeli and David Hutchison, A Survey of Key Management for Secure Group Communication, ACM Computing Surveys, Septemper 2003 [15] Fumiaki Sato and Shinya Tanaka, A push-based key distribution and rekeying protocol for secure multicasting, In Proceedings 8th International Conference on Parallel and Distributed Systems (ICPADS), 2000 [16] Ilya Shlyakhter, Manu Sridharan, and Daniel Jackson, Analyzing distributed algorithms with ‾rst-order logic, submitted for publication [17] Graham Steel and Alan Bundy, Attacking group multicast key management pro- tocols using coral, Electronic Notes in Theoretical Computer Science, 2005 [18] Graham Steel, Alan Bundy and Ewen Denney, Finding Counterexamples to Inductive Conjectures and Discovering Security Protocol Attacks, AISB Journal, 2002 [19] Graham Steel, lan Bundy and Monika Maidl, Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures, 2004 [20] Shinya Tanaka and Fumiaki Sato, A key distribution and rekeying framework with totally ordered multicast protocols, In Proceedings 15th International Con- ference on Information Networking, 2001 [21] Alloy, http://alloy.mit.edu/index.php | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/25121 | - |
| dc.description.abstract | 目前分析安全群播機制大多是使用人工的方式,但是利用人工的方式來分析安全群播機制時,往往有不足、設想不夠周全的地方,因此若能使用自動化工具來分析,可以幫助我們研究發展更安全的機制。
Alloy是一種關係式的模擬語言,在不給予機制的狀況下,只需要簡單的雛型,就可以建構所要模擬的行為,並有效率的模擬所想的狀況及加以分析。 我們利用Alloy Analyzer 來模擬分析使用轉密方式的安全群播機制,經過驗證的結果,找出這個安全群播機制的缺失,修正機制後更可以達到群播機制的基本安全特性。 | zh_TW |
| dc.description.abstract | At the present time, the secure multicast scheme analyze mostly by manual. But it considered comprehensive enough frequently. It can help us to develop a more secure multicast scheme by using the automatic tool.
Alloy is a model language based on relation. It can construct model of some behavior without mechanism, and modeling more efficient. We use Alloy Analyzer to simulate and analyze the secure multicast scheme that use proxy encryption. These analyses display one flaw when consider the transmit delay. The analyzer suggests and checks some fixes. Then the result makes sure the secure multicast scheme to achieve the basic properties. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-08T06:02:51Z (GMT). No. of bitstreams: 1 ntu-96-J94921023-1.pdf: 1059428 bytes, checksum: 2e1c8bcb97e18d4606fdac544e8368b2 (MD5) Previous issue date: 2007 | en |
| dc.description.tableofcontents | 1 Introduction 1
2 Related Work 3 2.1 Proxy Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3 Overview of Alloy 6 3.1 Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.1.1 Operators for Expressions . . . . . . . . . . . . . . . . . . . . . 7 3.1.2 Elementary Formulas . . . . . . . . . . . . . . . . . . . . . . . . 8 3.1.3 Higher-Order Quanti‾ers . . . . . . . . . . . . . . . . . . . . . . 8 3.1.4 Hight-level Constructs . . . . . . . . . . . . . . . . . . . . . . . 9 3.2 Analyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4 Secure Multicast Using Proxy Encryption 13 4.1 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 5 Model 16 5.1 Basic Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 5.2 Extended Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 5.3 Fact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 5.4 Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5.5 Assections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 6 Analysis 33 7 Conclusions and Future Work 36 | |
| dc.language.iso | en | |
| dc.subject | 安全群播機制 | zh_TW |
| dc.subject | Alloy | zh_TW |
| dc.subject | 模擬 | zh_TW |
| dc.subject | 代理人加密 | zh_TW |
| dc.subject | 協定分析 | zh_TW |
| dc.subject | Alloy | en |
| dc.subject | protoccl analysis | en |
| dc.subject | modeling | en |
| dc.subject | proxy encryption | en |
| dc.subject | scheme | en |
| dc.subject | secure multicast | en |
| dc.title | 使用Alloy分析安全群播機制 | zh_TW |
| dc.title | Automatic Analysis of Secure Multicast Scheme Using Alloy | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 95-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 顏嗣鈞,郭斯彥,黃秋煌 | |
| dc.subject.keyword | Alloy,安全群播機制,代理人加密,模擬,協定分析, | zh_TW |
| dc.subject.keyword | Alloy,secure multicast,scheme,proxy encryption,modeling,protoccl analysis, | en |
| dc.relation.page | 39 | |
| dc.rights.note | 未授權 | |
| dc.date.accepted | 2007-07-26 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-96-1.pdf 未授權公開取用 | 1.03 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
