메뉴 건너뛰기




Volumn , Issue , 2008, Pages 241-250

Formally sound refinement of Spi Calculus protocol specifications into java code

Author keywords

Correctness preserving code generation; Formal methods; Model based software development; Security protocols

Indexed keywords

CALCULATIONS; COMPUTER SOFTWARE; FORMAL LOGIC; NETWORK COMPONENTS; SOFTWARE DESIGN; SPECIFICATIONS; SYSTEMS ENGINEERING;

EID: 58449090669     PISSN: 15302059     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HASE.2008.27     Document Type: Conference Paper
Times cited : (2)

References (27)
  • 1
    • 24344493908 scopus 로고    scopus 로고
    • Computer-Assisted Verification of a Protocol for Certified Email
    • 58(l-2):3-27
    • M. Abadi and B. Blanchet. Computer-Assisted Verification of a Protocol for Certified Email. Science of Computer Programming, 58(l-2):3-27, 2005.
    • (2005) Science of Computer Programming
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 0003761061 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols the spi calculus
    • 149, 1998
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols the spi calculus. Research Report 149, 1998.
    • Research Report
    • Abadi, M.1    Gordon, A.D.2
  • 5
    • 84855729971 scopus 로고    scopus 로고
    • Web services policy 1.2 - attachment (WS- policyattachment)
    • S. Bajaj et al. Web services policy 1.2 - attachment (WS- policyattachment). W3C Recommendation, 2006.
    • (2006) Recommendation , vol.W3C
    • Bajaj, S.1
  • 6
    • 84855729971 scopus 로고    scopus 로고
    • Web services policy 1.2 - framework (WS- policy)
    • S. Bajaj et al. Web services policy 1.2 - framework (WS- policy). W3C Recommendation, 2006.
    • (2006) Recommendation , vol.W3C
    • Bajaj, S.1
  • 9
    • 58449124921 scopus 로고    scopus 로고
    • K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In
    • K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In
  • 11
    • 0034822279 scopus 로고    scopus 로고
    • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    • B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In IEEE Computer Security Foundations Workshop, pages 82-96, 2001.
    • (2001) IEEE Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 15
    • 24144433896 scopus 로고    scopus 로고
    • Implementing a formally verifiable security protocol in Java card
    • E. Hubbers, M. Oostdijk, and E. Poll. Implementing a formally verifiable security protocol in Java card. In Security in Pervasive Computing, pages 213-226, 2003.
    • (2003) Security in Pervasive Computing , pp. 213-226
    • Hubbers, E.1    Oostdijk, M.2    Poll, E.3
  • 18
    • 33745178885 scopus 로고    scopus 로고
    • Verification of low-level crypto-protocol implementations using automated theorem proving
    • J. Jürjens. Verification of low-level crypto-protocol implementations using automated theorem proving. In Formal Methods and Models for Co-Design, pages 89-98, 2005.
    • (2005) Formal Methods and Models for Co-Design , pp. 89-98
    • Jürjens, J.1
  • 20
    • 58449117676 scopus 로고    scopus 로고
    • A. Nadalin, C. Kaler, P. Hallam-Baker, and R. Monzillo. OASIS web services security: SOAP message security 1.1 (WS-security 2004), 2006.
    • A. Nadalin, C. Kaler, P. Hallam-Baker, and R. Monzillo. OASIS web services security: SOAP message security 1.1 (WS-security 2004), 2006.
  • 22
    • 48049092340 scopus 로고    scopus 로고
    • An experiment in interoperable cryptographic protocol implementation using automatic code generation
    • A. Pironti and R. Sisto. An experiment in interoperable cryptographic protocol implementation using automatic code generation. In IEEE Symposium on Computers and Communications, pages 839-844, 2007.
    • (2007) IEEE Symposium on Computers and Communications , pp. 839-844
    • Pironti, A.1    Sisto, R.2
  • 23
    • 58449132573 scopus 로고    scopus 로고
    • Correctness-preserving translation from Spi Calculus to Java
    • revision 2. Technical Report, Politecnico di Torino, Aug, Available at
    • A. Pironti and R. Sisto. Correctness-preserving translation from Spi Calculus to Java, revision 2. Technical Report, Politecnico di Torino, Aug. 2008. Available at: http://staff.polito.it/riccardo.sisto/reports/translation2. ps.
    • (2008)
    • Pironti, A.1    Sisto, R.2
  • 26
    • 18144362508 scopus 로고    scopus 로고
    • ASM refinement and generalizations of forward simulation in data refinement: A comparison
    • G. Schellhorn. ASM refinement and generalizations of forward simulation in data refinement: a comparison. Theoretical Computer Science, 336(2-3):403-435, 2005.
    • (2005) Theoretical Computer Science , vol.336 , Issue.2-3 , pp. 403-435
    • Schellhorn, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.