Generating network security protocol implementations from formal specifications

被引:0
|
作者
Tobler, Benjamin [1 ]
Hutchison, Andrew C. M. [1 ]
机构
[1] Department of Computer Science, University of Cape Town, Private Bag, Rondebosch 7701, South Africa
关键词
Code Generation - [!text type='Java']Java[!/text] - Process algebras - Prolog - Security - SPI calculus;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:34 / 53
相关论文
共 50 条
  • [1] Generating network security protocol implementations from formal specifications
    Tobler, B
    Hutchison, ACM
    [J]. Certification and Security in Inter-Organizational E-Services, 2005, 177 : 33 - 53
  • [2] TOGO-generating communication protocol implementations from formal specifications
    Naumann, F
    Simon, R
    Szczepanski, T
    Ulrich, A
    [J]. WFCS '97 - 1997 IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS, PROCEEDINGS, 1997, : 287 - 296
  • [3] Formal verification of security protocol implementations: a survey
    Avalle, Matteo
    Pironti, Alfredo
    Sisto, Riccardo
    [J]. FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 99 - 123
  • [4] A Modeling Framework for Generating Security Protocol Specifications
    Bela, Genge
    Piroska, Haller
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, 2009, : 362 - 365
  • [5] Formal security policy implementations in network firewalls
    Macfarlane, Richard
    Buchanan, William
    Ekonomou, Elias
    Uthmani, Omair
    Fan, Lu
    Lo, Owen
    [J]. COMPUTERS & SECURITY, 2012, 31 (02) : 253 - 270
  • [6] GENERATING DIAGRAM EDITORS FROM FORMAL SPECIFICATIONS
    AREFI, F
    MILANI, MT
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 1992, 34 (03) : 139 - 146
  • [7] GENERATING TEST CASES FROM FORMAL SPECIFICATIONS
    Toth, Kalman C.
    Donat, Michael R.
    Joyce, Jeffrey J.
    [J]. INCOSE International Symposium, 1996, 6 (01): : 463 - 470
  • [8] From Computationally-proved Protocol Specifications to Implementations
    Cade, David
    Blanchet, Bruno
    [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 65 - 74
  • [9] Validation of security protocol implementations from security objectives
    Fu, Yulong
    Kone, Ousmane
    [J]. COMPUTERS & SECURITY, 2013, 36 : 27 - 39
  • [10] Generating Maude formal specifications from AUML diagrams
    Mokhati, Farid
    Boudiaf, Noura
    Badri, Linda
    Badri, Mourad
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2006, 6 (5-6) : S73 - S89