Entity

Time filter

Source Type


Zhao H.,Shandong University of Technology | Zhao H.,The Institute of Oceanographic Instrumentation | Meng F.-J.,Zibo Heating Power Co.Ltd | Song Z.-F.,Luoyang Normal University | And 2 more authors.
International Journal of Advancements in Computing Technology | Year: 2011

The purpose of this paper is to realize automatic multi-protocol counterexample constructing in VO (virtual organization). In this paper, we present the logic which is based on multi-agent system to specify various security properties in VO. Furthermore, we present the semi-bundle structure and the goal-binding mechanism in Athena for checking the validity of the well-formed formulas in the logic, which effectively ignores the infinite internal message forwarding for agent along with other redundancies in protocol executions, such as the order of interleaving actions. Source


Zhao H.,Shandong University of Technology | Zhou Z.-H.,The Institute of Oceanographic Instrumentation | Wang F.-Y.,Shandong University of Technology | Song Z.-F.,Luoyang Normal University | And 2 more authors.
International Journal of Advancements in Computing Technology | Year: 2011

(Virtual Organization) is defined as a key concept for operation and management of grid services, which realizes coordinated resource sharing across multiple management domains. Due to the fact that VO focuses on dynamic, cross-organizational sharing relationships, one of the central challenges in the construction of scalable VO is that protocols specified by VO may have process of parallel running. In this paper, we establish arithmetic for protocols with strand spaces model that ensures that the parallel attack scene of non-honest participants in VO, which is called the parallel attack counterexample for VO, can be defined. Source


Zhou Z.-H.,The Institute of Oceanographic Instrumentation | Zhou Z.-H.,Ocean University of China | Yuan J.,The Institute of Oceanographic Instrumentation | Zhao H.,The Institute of Oceanographic Instrumentation
International Journal of Advancements in Computing Technology | Year: 2012

In this paper, we give an abstraction of multi-secret sharing schemes based on lagrange interpolating polynomial that is accessible to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using an equational theory that abstractly characterizes the cryptographic semantics of secret share. Based on that, we verify the threshold certificate protocol in a convergent rewriting system suitable for the automated protocol verifier ProVerif. Source

Discover hidden collaborations