Generating network security protocol implementations from formal specifications

被引:0
|
作者
Tobler, Benjamin [1 ]
Hutchison, Andrew C. M. [1 ]
机构
[1] Department of Computer Science, University of Cape Town, Private Bag, Rondebosch 7701, South Africa
关键词
Code Generation - [!text type='Java']Java[!/text] - Process algebras - Prolog - Security - SPI calculus;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:34 / 53
相关论文
共 50 条
  • [31] Security Analysis on InfiniBand Protocol Implementations
    Subedi, Kul Prasad
    Dasgupta, Dipankar
    Chen, Bo
    [J]. PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [32] Formal Verification of Security Specifications with Common Criteria
    Morimoto, Shoichi
    Shigematsu, Shinjiro
    Goto, Yuichi
    Cheng, Jingde
    [J]. APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1506 - +
  • [33] A Model-based Approach to Security Flaw Detection of Network Protocol Implementations
    Hsu, Yating
    Shu, Guoqiang
    Lee, David
    [J]. 16TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS: ICNP'08, 2008, : 114 - 123
  • [34] PROTOCOL TRACE ANALYSIS BASED ON FORMAL SPECIFICATIONS
    KIM, MC
    CHANSON, ST
    VUONG, ST
    [J]. IFIP TRANSACTIONS C-COMMUNICATION SYSTEMS, 1992, 2 : 393 - 408
  • [35] Complementing computational protocol analysis with formal specifications
    Choo, KKR
    Boyd, C
    Hitchcock, Y
    Maitland, G
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 129 - 144
  • [36] From protocol specifications to flaws and attack scenarios: An automatic and formal algorithm
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    [J]. SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 256 - 261
  • [37] Formal verification of abstract system and protocol specifications
    Schneider, Axel
    Bluhm, Thomas
    Renner, Tobias
    Heinkel, Ulrich
    Knaeblein, Joachim
    Zavala, Reynaldo
    [J]. 30TH ANNUAL IEEE/NASA SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2006, : 207 - +
  • [38] Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements
    Hassan, R.
    Eltoweissy, M.
    Bohner, S.
    El-Kassas, S.
    [J]. IET SOFTWARE, 2010, 4 (02) : 149 - 160
  • [39] Which widgets? Transforming formal user-interface specifications to implementations
    Hussey, A
    Carrington, D
    [J]. PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 295 - 306
  • [40] An Innovative Teaching Tool for the Verification of Abstract Data Type Implementations from Formal Algebraic Specifications
    del Vado Virseda, Rafael
    Perez Morente, Fernando
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, ICCS 2012, 2012, 9 : 1743 - 1752