翻訳と辞書
Words near each other
・ Bursera
・ Bursera aromatica
・ Bursera bipinnata
・ Bursera cerasifolia
・ Bursera fagaroides
・ Burrows (surname)
・ Burrows baronets
・ Burrows Block
・ Burrows Burdick
・ Burrows Cave
・ Burrows Island Light
・ Burrows Township, Platte County, Nebraska
・ Burrows, Indiana
・ Burrows, Saskatchewan
・ Burrowsville, Virginia
Burrows–Abadi–Needham logic
・ Burrows–Wheeler transform
・ Burrrprint (2) HD
・ Burrs Country Park
・ Burrs Mill
・ Burrs Mill Brook
・ Burrs Mill, New Jersey
・ Burrstone
・ Burrsville
・ Burrsville, Maryland
・ Burrsville, New Jersey
・ Burrton Township, Harvey County, Kansas
・ Burrton, Kansas
・ Burru
・ Burrum Coast National Park


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Burrows–Abadi–Needham logic : ウィキペディア英語版
Burrows–Abadi–Needham logic
Burrows–Abadi–Needham logic (also known as the BAN logic) is a set of rules for defining and analyzing information exchange protocols. Specifically, BAN logic helps its users determine whether exchanged information is trustworthy, secured against eavesdropping, or both. BAN logic starts with the assumption that all information exchanges happen on media vulnerable to tampering and public monitoring. This has evolved into the popular security mantra, "Don't trust the network."
A typical BAN logic sequence includes three steps:〔(【引用サイトリンク】 publisher = UT Austin CS )
# Verification of message origin
# Verification of message freshness
# Verification of the origin's trustworthiness.
BAN logic uses postulates and definitions – like all axiomatic systems – to analyze authentication protocols. Use of the BAN logic often accompanies a security protocol notation formulation of a protocol and is sometimes given in papers.
==Language type and alternatives==
BAN logic, and logics in the same family, are decidable: there exists an algorithm taking BAN hypotheses and a purported conclusion, and that answers whether or not the conclusion is derivable from the hypotheses. The proposed algorithms use a variant of magic sets (Monniaux, 1999).
BAN logic inspired many other similar formalisms, such as GNY logic. Some of these try to repair one weakness of BAN logic: the lack of a good semantics with a clear meaning in terms of knowledge and possible universes. However, starting in the mid-1990s, crypto protocols were analyzed in operational models (assuming perfect cryptography) using model checkers, and numerous bugs were found in protocols that were "verified" with BAN logic and related formalisms. This has led to the abandonment of BAN-family logics in favor of proof methods based on standard invariance reasoning.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Burrows–Abadi–Needham logic」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.