Generating network security protocol implementations from formal specifications

被引:0
|
作者
Tobler, Benjamin [1 ]
Hutchison, Andrew C. M. [1 ]
机构
[1] Department of Computer Science, University of Cape Town, Private Bag, Rondebosch 7701, South Africa
关键词
Code Generation - [!text type='Java']Java[!/text] - Process algebras - Prolog - Security - SPI calculus;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:34 / 53
相关论文
共 50 条
  • [41] A Software Testing Tool for the Verification of Abstract Data Type Implementations from Formal Algebraic Specifications
    del Vado Virseda, Rafael
    [J]. 2012 IEEE 25TH CONFERENCE ON SOFTWARE ENGINEERING EDUCATION AND TRAINING (CSEE&T), 2012, : 100 - 104
  • [42] Verifying Protocol Implementations by Augmenting Existing Cryptographic Libraries with Specifications
    Vanspauwen, Gijs
    Jacobs, Bart
    [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, 2015, 9276 : 53 - 68
  • [43] Formal Verification of Security Policy Implementations in Enterprise Networks
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 117 - +
  • [44] From global specifications to distributed implementations
    Mukund, M
    [J]. SYNTHESIS AND CONTROL OF DISCRETE EVENT SYSTEMS, 2002, : 19 - 35
  • [45] Applying formal methods to a protocol standard and its implementations
    Bruns, G
    Staskauskas, M
    [J]. SOFTWARE ENGINEERING FOR PARALLEL AND DISTRIBUTED SYSTEMS - INTERNATIONAL SYMPOSIUM PROCEEDINGS, 1998, : 198 - 205
  • [46] Formal techniques for automatically generating marshalling code from high-level specifications
    Dietz, P
    Weigert, T
    Weil, F
    [J]. 2ND IEEE WORKSHOP ON INDUSTRIAL STRENGTH FORMAL SPECIFICATION TECHNIQUES - PROCEEDINGS, 1999, : 40 - 47
  • [47] Security Testing of Session Initiation Protocol Implementations
    Harris, Ian G.
    Alrahem, Thoulfekar
    Chen, Alex
    DiGiuseppe, Nick
    Gee, Jefferey
    Hsiao, Shang-Pin
    Mattox, Sean
    Park, Taejoon
    Selvaraj, Saravanan
    Tam, Albert
    Carlsson, Marcel
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (02): : 91 - 103
  • [48] A concern-based approach to generating formal requirements specifications
    Jin, Ying
    Zhang, Jing
    Hao, Weiping
    Ma, Pengfei
    Zhang, Yan
    Zhao, Haiyan
    Mei, Hong
    [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (02): : 162 - 172
  • [49] A concern-based approach to generating formal requirements specifications
    Ying Jin
    Jing Zhang
    Weiping Hao
    Pengfei Ma
    Yan Zhang
    Haiyan Zhao
    Hong Mei
    [J]. Frontiers of Computer Science in China, 2010, 4 : 162 - 172
  • [50] Slede: A Domain-Specific Verification Framework for Sensor Network Security Protocol Implementations
    Hanna, Youssef
    Rajan, Hridesh
    Zhang, Wensheng
    [J]. WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 109 - 118