Font Size: a A A

Formal Analysis For Electronic Commerce Protocols

Posted on:2008-11-23Degree:MasterType:Thesis
Country:ChinaCandidate:B WangFull Text:PDF
GTID:2178360242970281Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The methods certificating the natures of Electronic Commerce Protocols have always been constraining the development of Electronic Commerce. The formal analysis technology can make the designers concentrate their attentions on interface,assumptions on system environment,system statuses on different conditions,circumstances when the conditions are not satisfied and the unchanged attributes of the system, then, designers can also certificate the system using this technology to provide a security promise necessarily in Electronic Commerce Protocols. Now, there are mainly three methods researching on Formal Security Protocols at home or abroad: modal logic method basing on knowledge and faith reasoning, method basing on theorem proving and structural method basing on attack. These methods are also effective used in Electronic Commerce Protocols which is a part of Security Protocols.The formal methods have been applied on analyzing Electronic Commerce Protocols. Contents are as the followings:1, Outline the development process of Electronic Commerce Protocols and the encryption method and formal method being used in the process.2, Make researching on the security natures of Electronic Commerce Protocols, such as anonymity, atomicity, non-repudiation and so on, also, give some case analyses.3, Raise a new safe Electronic Commerce Protocols meeting money atomicity, commodities atomicity and non-repudiation after the second work. Detailed analysis has been made on the Protocols.
Keywords/Search Tags:Electronic Commerce Protocols, Formal Analysis, Atomicity, Non-repudiation
PDF Full Text Request
Related items