Abstract
This paper mainly studies formal construction of secure information transmission in Office Automation system. With a comprehensive analysis on security requirements in Office Automation system, the processes of information transmission can be divided into two types: user-to-server and user-to-user. Based on this, the formal processes of secure information transmission are constructed with composition method in symmetric key cryptosystem. The formal analysis shows that secrecy, integrity, availability and identifiability of information during transmission could be insured by this construction, which could be used as a direction for development of other various application systems in digital campus, from the viewpoint of information security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hummel, S.: Network Security Model-Defining an Enterprise Security Strategy, http://computerdetailreviews.com/2010/07/network-security-model-defining-an-enterprise-security-strategy/
Ramaraj, E., Karthikeyan, S., Hemalatha, M.: A Design of Security Protocol using Hybrid Encryption Technique (AES- Rijndael and RSA). International Journal of The Computer 17(1), 78–86 (2009)
Guttman, J.D.: Security protocol design via authentication tests. In: Proc. the 15th IEEE Computer Security Foundations Workshop, pp. 92–103 (2002)
Song, D.: An automatic approach for building secure systems. PhD thesis. University of California at Berkeley, California (2002)
Choi, H.-J.: Security protocol design by composition. PhD thesis. University of Cambridge, Cambridge (2006)
Yang, J., Cao, T.: A Verifier-based Password-Authenticated Key Exchange Protocol via Elliptic Curves. Journal of Computational Information Systems 7(2), 548–553 (2011)
Gu, X., Zhang, Z., Qiu, J.: Research on Wireless Security Protocol Design. Computer Science 38(9), 103–107 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, X., Nie, L., Yin, J., Lu, Y. (2012). Formal Construction of Secure Information Transmission in Office Automation System. In: Wang, F.L., Lei, J., Gong, Z., Luo, X. (eds) Web Information Systems and Mining. WISM 2012. Lecture Notes in Computer Science, vol 7529. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33469-6_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-33469-6_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33468-9
Online ISBN: 978-3-642-33469-6
eBook Packages: Computer ScienceComputer Science (R0)